Warning: Permanently added '10.128.1.9' (ECDSA) to the list of known hosts. 2020/03/04 00:45:57 fuzzer started 2020/03/04 00:45:58 dialing manager at 10.128.0.105:43249 2020/03/04 00:45:59 syscalls: 2955 2020/03/04 00:45:59 code coverage: enabled 2020/03/04 00:45:59 comparison tracing: enabled 2020/03/04 00:45:59 extra coverage: enabled 2020/03/04 00:45:59 setuid sandbox: enabled 2020/03/04 00:45:59 namespace sandbox: enabled 2020/03/04 00:45:59 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/04 00:45:59 fault injection: enabled 2020/03/04 00:45:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/04 00:45:59 net packet injection: enabled 2020/03/04 00:45:59 net device setup: enabled 2020/03/04 00:45:59 concurrency sanitizer: enabled 2020/03/04 00:45:59 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 63.360720][ T7683] KCSAN: could not find function: 'poll_schedule_timeout' [ 64.583581][ T7683] KCSAN: could not find function: '_find_next_bit' 2020/03/04 00:46:02 adding functions to KCSAN blacklist: 'tick_sched_do_timer' 'ext4_has_free_clusters' 'ext4_mb_good_group' '__add_to_page_cache_locked' 'generic_write_end' 'kauditd_thread' 'copy_process' 'tick_nohz_next_event' 'audit_log_start' 'do_signal_stop' 'do_nanosleep' 'ep_poll' '__ext4_new_inode' 'print_cpu' 'blk_mq_get_request' 'find_get_pages_range_tag' 'ktime_get_real_seconds' 'add_timer' 'xas_clear_mark' 'mod_timer' 'run_timer_softirq' 'ext4_free_inodes_count' 'poll_schedule_timeout' 'blk_mq_dispatch_rq_list' '__process_echoes' 'wbt_done' 'futex_wait_queue_me' 'blk_mq_sched_dispatch_requests' 'ext4_mark_iloc_dirty' '_find_next_bit' 'generic_fillattr' 00:49:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) 00:49:29 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) [ 270.917195][ T7688] IPVS: ftp: loaded support on port[0] = 21 [ 271.006494][ T7688] chnl_net:caif_netlink_parms(): no params data found [ 271.066630][ T7688] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.073754][ T7688] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.082640][ T7688] device bridge_slave_0 entered promiscuous mode [ 271.090759][ T7688] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.098301][ T7688] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.106418][ T7688] device bridge_slave_1 entered promiscuous mode [ 271.123726][ T7688] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.134894][ T7688] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.169985][ T7694] IPVS: ftp: loaded support on port[0] = 21 [ 271.177986][ T7688] team0: Port device team_slave_0 added [ 271.185677][ T7688] team0: Port device team_slave_1 added [ 271.202973][ T7688] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 271.209982][ T7688] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 271.236317][ T7688] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 271.250109][ T7688] batman_adv: batadv0: Adding interface: batadv_slave_1 00:49:29 executing program 2: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) [ 271.257675][ T7688] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 271.302068][ T7688] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 271.384338][ T7688] device hsr_slave_0 entered promiscuous mode [ 271.421716][ T7688] device hsr_slave_1 entered promiscuous mode 00:49:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000005600)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002240)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, 0x0, 0x0, &(0x7f0000002400)=ANY=[]}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000054c0)=ANY=[]}}], 0x3, 0x4000000) socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0], 0x4}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus/file0\x00', 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20048841) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x800000000000003, 0xfa9, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r3, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000200)={0x9, [0x9], 0x7fff}, 0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x4, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x800fe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) [ 271.559199][ T7696] IPVS: ftp: loaded support on port[0] = 21 [ 271.691181][ T7694] chnl_net:caif_netlink_parms(): no params data found [ 271.736933][ T7699] IPVS: ftp: loaded support on port[0] = 21 [ 271.758195][ T7688] netdevsim netdevsim0 netdevsim0: renamed from eth0 00:49:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000), 0x10) [ 271.843752][ T7688] netdevsim netdevsim0 netdevsim1: renamed from eth1 00:49:30 executing program 5: r0 = getpid() capget(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000140)) [ 272.065434][ T7688] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 272.067789][ T7701] IPVS: ftp: loaded support on port[0] = 21 [ 272.133797][ T7688] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 272.216207][ T7707] IPVS: ftp: loaded support on port[0] = 21 [ 272.234984][ T7694] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.242903][ T7694] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.253215][ T7694] device bridge_slave_0 entered promiscuous mode [ 272.281717][ T7696] chnl_net:caif_netlink_parms(): no params data found [ 272.291728][ T7694] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.298786][ T7694] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.306453][ T7694] device bridge_slave_1 entered promiscuous mode [ 272.347690][ T7694] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 272.377027][ T7694] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 272.437358][ T7694] team0: Port device team_slave_0 added [ 272.455012][ T7694] team0: Port device team_slave_1 added [ 272.463437][ T7701] chnl_net:caif_netlink_parms(): no params data found [ 272.495992][ T7694] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 272.503603][ T7694] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 272.529735][ T7694] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 272.543694][ T7694] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 272.550748][ T7694] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 272.577566][ T7694] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 272.603040][ T7699] chnl_net:caif_netlink_parms(): no params data found [ 272.615293][ T7696] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.623039][ T7696] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.630654][ T7696] device bridge_slave_0 entered promiscuous mode [ 272.638816][ T7696] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.646157][ T7696] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.654021][ T7696] device bridge_slave_1 entered promiscuous mode [ 272.753413][ T7694] device hsr_slave_0 entered promiscuous mode [ 272.791787][ T7694] device hsr_slave_1 entered promiscuous mode [ 272.831526][ T7694] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 272.839099][ T7694] Cannot create hsr debugfs directory [ 272.850573][ T7696] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 272.865651][ T7707] chnl_net:caif_netlink_parms(): no params data found [ 272.886567][ T7696] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 272.951860][ T7696] team0: Port device team_slave_0 added [ 272.957620][ T7701] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.966898][ T7701] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.974722][ T7701] device bridge_slave_0 entered promiscuous mode [ 272.983721][ T7688] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.990652][ T7701] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.998273][ T7701] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.007580][ T7701] device bridge_slave_1 entered promiscuous mode [ 273.023639][ T7696] team0: Port device team_slave_1 added [ 273.029292][ T7699] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.036643][ T7699] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.044868][ T7699] device bridge_slave_0 entered promiscuous mode [ 273.081032][ T7701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 273.090201][ T7699] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.097493][ T7699] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.105252][ T7699] device bridge_slave_1 entered promiscuous mode [ 273.129894][ T7688] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.138114][ T7701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.151792][ T7696] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 273.158774][ T7696] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 273.185083][ T7696] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 273.201322][ T7696] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 273.208343][ T7696] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 273.234525][ T7696] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 273.245758][ T7694] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 273.317841][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.325729][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.347741][ T7707] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.354843][ T7707] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.362666][ T7707] device bridge_slave_0 entered promiscuous mode [ 273.370876][ T7699] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 273.392608][ T7694] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 273.443638][ T7701] team0: Port device team_slave_0 added [ 273.449427][ T7694] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 273.493620][ T7694] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 273.533043][ T7707] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.540107][ T7707] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.548124][ T7707] device bridge_slave_1 entered promiscuous mode [ 273.555641][ T7699] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.613120][ T7696] device hsr_slave_0 entered promiscuous mode [ 273.661834][ T7696] device hsr_slave_1 entered promiscuous mode [ 273.701598][ T7696] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 273.709211][ T7696] Cannot create hsr debugfs directory [ 273.715685][ T7701] team0: Port device team_slave_1 added [ 273.731394][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.740064][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.750597][ T7706] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.757918][ T7706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.773741][ T7699] team0: Port device team_slave_0 added [ 273.785093][ T7701] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 273.792339][ T7701] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 273.818912][ T7701] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 273.831319][ T7701] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 273.838331][ T7701] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 273.864928][ T7701] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 273.887257][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.896657][ T7707] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 273.912094][ T7699] team0: Port device team_slave_1 added [ 273.918408][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.928287][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.936705][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.943772][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.951698][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 273.977840][ T7707] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.996489][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.022026][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.030607][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.047653][ T7699] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 274.055072][ T7699] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.084241][ T7699] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 274.133160][ T7701] device hsr_slave_0 entered promiscuous mode [ 274.171760][ T7701] device hsr_slave_1 entered promiscuous mode [ 274.221870][ T7701] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 274.229430][ T7701] Cannot create hsr debugfs directory [ 274.242484][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 274.250801][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.262577][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.275660][ T7699] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 274.282722][ T7699] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.309033][ T7699] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 274.332851][ T7707] team0: Port device team_slave_0 added [ 274.339903][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.348901][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.357381][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.365737][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.392298][ T7707] team0: Port device team_slave_1 added [ 274.401189][ T7688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 274.483929][ T7699] device hsr_slave_0 entered promiscuous mode [ 274.551727][ T7699] device hsr_slave_1 entered promiscuous mode [ 274.601587][ T7699] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 274.609170][ T7699] Cannot create hsr debugfs directory [ 274.631646][ T7707] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 274.638698][ T7707] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.664922][ T7707] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 274.698912][ T7707] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 274.706230][ T7707] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.732614][ T7707] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 274.743545][ T7696] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 274.783777][ T7696] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 274.825542][ T7694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.852616][ T7696] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 274.943440][ T7707] device hsr_slave_0 entered promiscuous mode [ 274.981890][ T7707] device hsr_slave_1 entered promiscuous mode [ 275.031518][ T7707] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 275.039148][ T7707] Cannot create hsr debugfs directory [ 275.052799][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.060298][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.067755][ T7696] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 275.141982][ T7701] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 275.202091][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.209746][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.218496][ T7699] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 275.273770][ T7701] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 275.316578][ T7701] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 275.366784][ T7699] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 275.463787][ T7699] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 275.536920][ T7699] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 275.585170][ T7701] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 275.645083][ T7694] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.676351][ T7688] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 275.712661][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.721247][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.729844][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.736922][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.745537][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.774990][ T7707] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 275.833640][ T7707] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 275.865208][ T7707] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 275.924143][ T7707] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 275.967914][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.977380][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.986218][ T7725] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.993418][ T7725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.027807][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.036601][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.045679][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.054575][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.063292][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 276.072027][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.080926][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.101329][ T7694] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 276.112282][ T7694] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 276.127268][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.135869][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.144670][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.152895][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.161128][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 276.169517][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.177676][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 276.185883][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.194519][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 276.202217][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.210118][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.229898][ T7696] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.243344][ T7688] device veth0_vlan entered promiscuous mode [ 276.257970][ T7688] device veth1_vlan entered promiscuous mode [ 276.288877][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 276.298324][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 276.306272][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 276.315970][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.329355][ T7696] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.347813][ T7699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.357320][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.365298][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.374827][ T7694] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 276.409658][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.418950][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.427547][ T7725] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.434581][ T7725] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.442470][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.449976][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.463198][ T7688] device veth0_macvtap entered promiscuous mode [ 276.476360][ T7688] device veth1_macvtap entered promiscuous mode [ 276.485887][ T7699] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.500225][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.508625][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 276.517352][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 276.525923][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 276.534237][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.542834][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.551085][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.558167][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.566512][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.575630][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.584370][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.592712][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.599715][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.608230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.616783][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.625301][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.632339][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.640789][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 276.649169][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.664166][ T7701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.673817][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.708402][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.717834][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.727151][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.735883][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.744684][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.753643][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.762265][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.770760][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.779489][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.788091][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.796697][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 276.805349][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.814147][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.822745][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.831317][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.839594][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.862623][ T7688] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 276.878814][ T7696] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 276.889624][ T7696] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 276.903528][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 276.912360][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.920734][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.929415][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.939427][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.947774][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.956161][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 276.964587][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.973306][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.980973][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.988651][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 276.996991][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.010422][ T7694] device veth0_vlan entered promiscuous mode [ 277.020356][ T7701] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.029651][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.037673][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.045520][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 277.056474][ T7688] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 277.067906][ T7699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 277.082212][ T7694] device veth1_vlan entered promiscuous mode [ 277.088922][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 277.097241][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 277.105965][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.114842][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.123803][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.132423][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.139509][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.150480][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.175121][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.187067][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.196127][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.203191][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.215080][ T7707] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.239540][ T7696] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 277.259487][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 277.267699][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.275534][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.284642][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.292502][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.299864][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 277.328989][ T7707] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.342229][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.351105][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 277.360151][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 277.369239][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 277.377921][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.386746][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 277.395574][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.404129][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.412205][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.420404][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 277.437163][ T7701] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 277.448766][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 277.458009][ T7699] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 277.478089][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 277.489112][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 277.497681][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.506232][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.514565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 277.523282][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 277.532250][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.542125][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.550570][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.557622][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.566128][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.574817][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.583382][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.590470][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.598671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.610162][ T7694] device veth0_macvtap entered promiscuous mode [ 277.629455][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 277.638093][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 277.650034][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.682514][ T7694] device veth1_macvtap entered promiscuous mode [ 277.715185][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 277.723503][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.730930][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.738681][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 277.747221][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.757993][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 277.766600][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 277.775538][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 277.784158][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 277.794289][ T7696] device veth0_vlan entered promiscuous mode [ 277.802650][ T7694] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 277.813473][ T7694] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.825813][ T7694] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 277.840523][ T7699] device veth0_vlan entered promiscuous mode [ 277.854270][ T7701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 277.864176][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.872210][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.880156][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 277.888564][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 277.897574][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.906369][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 277.914676][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.926339][ T7694] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.938162][ T7694] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.949314][ T7694] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 277.971614][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.979453][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.996467][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 278.006225][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 278.015093][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.023675][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.035494][ T7699] device veth1_vlan entered promiscuous mode [ 278.053788][ T7696] device veth1_vlan entered promiscuous mode [ 278.074043][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 278.089305][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 278.097261][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 278.108152][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.116408][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 278.124749][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.139968][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 00:49:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) [ 278.202774][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 278.217155][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 278.247888][ T7699] device veth0_macvtap entered promiscuous mode [ 278.265173][ T7699] device veth1_macvtap entered promiscuous mode [ 278.285741][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 00:49:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) [ 278.302399][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 278.318891][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 278.332352][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 278.339797][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 278.351286][ T7707] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 278.381537][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 00:49:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) [ 278.407049][ T7699] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.429723][ T7699] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.440118][ T7699] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.450828][ T7699] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.462312][ T7699] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 278.474958][ T7701] device veth0_vlan entered promiscuous mode [ 278.499855][ T7696] device veth0_macvtap entered promiscuous mode [ 278.509115][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 278.518768][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 278.531103][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 00:49:36 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) [ 278.547010][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 278.556291][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 278.567534][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 278.578144][ T7699] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.589001][ T7699] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.599131][ T7699] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.609808][ T7699] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.624740][ T7699] batman_adv: batadv0: Interface activated: batadv_slave_1 00:49:36 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) [ 278.646373][ T7701] device veth1_vlan entered promiscuous mode [ 278.657929][ T7696] device veth1_macvtap entered promiscuous mode [ 278.666845][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 278.675348][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 278.690651][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 278.699163][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 278.708126][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 278.716587][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 278.729003][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 278.756323][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 278.782952][ T7696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 00:49:37 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) [ 278.811633][ T7696] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.828403][ T7696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 278.839299][ T7696] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.850227][ T7696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 00:49:37 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) [ 278.874762][ T7696] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.895311][ T7696] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 278.929812][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 278.938965][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 278.959041][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 278.983513][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.003805][ T7696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.017605][ T7696] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.028344][ T7696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.041382][ T7696] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.055080][ T7696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.066524][ T7696] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.079957][ T7696] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 279.089233][ T7701] device veth0_macvtap entered promiscuous mode [ 279.115108][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 279.124290][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 279.133372][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 279.142335][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.151116][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 279.159468][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.169856][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 279.178687][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 279.186506][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.198460][ T7701] device veth1_macvtap entered promiscuous mode [ 279.218147][ T7707] device veth0_vlan entered promiscuous mode [ 279.252532][ T7701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 279.263595][ T7701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.275190][ T7701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 279.287768][ T7701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.300113][ T7701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 279.310784][ T7701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.320928][ T7701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 279.332060][ T7701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.343387][ T7701] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 279.353180][ T7707] device veth1_vlan entered promiscuous mode [ 279.361395][ T7701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.372065][ T7701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.382200][ T7701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.393346][ T7701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.403317][ T7701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.413755][ T7701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.424446][ T7701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.435002][ T7701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.446381][ T7701] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 279.458010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 279.467104][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 279.497689][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 00:49:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) [ 279.515371][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 279.531409][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 279.540567][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.605923][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 279.636980][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 279.655620][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 279.676625][ T7707] device veth0_macvtap entered promiscuous mode [ 279.714946][ T7707] device veth1_macvtap entered promiscuous mode [ 279.761881][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 279.771764][ T2630] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 279.780217][ T7707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 279.794242][ T7707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.804624][ T7707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 279.815483][ T7707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.825376][ T7707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 279.835804][ T7707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.846433][ T7707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 279.857097][ T7707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.866931][ T7707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 279.877709][ T7707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.888774][ T7707] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 279.900558][ T7707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.911051][ T7707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.926120][ T7707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.937361][ T7707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.947507][ T7707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.958040][ T7707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.968111][ T7707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.978537][ T7707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 279.988366][ T7707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 279.999102][ T7707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 280.010416][ T7707] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 280.021719][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 280.030352][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 280.039969][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 280.048704][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 280.193528][ C0] hrtimer: interrupt took 34657 ns 00:49:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x6210}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:49:38 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000000c0)) 00:49:38 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) kcmp(r2, r0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) 00:49:38 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x91100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:49:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000380)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef3010b74902d722abfeb19fd8a7a2d74b945abf90f4d28ceac3e72751c0d33c28183f8caa011180", 0x61, 0x400}], 0x0, 0x0) 00:49:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x11, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x1c) 00:49:38 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) 00:49:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 280.595281][ T7916] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 00:49:38 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x81}, {0x6}]}) 00:49:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clock_adjtime(0x0, &(0x7f0000000300)={0x3}) [ 280.715104][ T7925] EXT4-fs (loop1): invalid first ino: 3552596263 00:49:38 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) 00:49:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="f49a8c0121d609801b176909a8e0ca24f5b248111cee21ecc856b4356592067c56b364e4a337b31f77d6aba53cc8d963b5d4f80977d555f10b35fc139b2ca7d08a267a0fa3c44f26b05c8bd1338b50d43cbe84dd4e8d25c7832a392da41da4dffb74f79e8fda74eb525952d4bda43ee972711e5eb57941ab7c9f8f0dec5ae7ea", 0x80}], 0x1}}], 0x1, 0x0) 00:49:39 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000), 0x200) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x519000, 0x600fb0f, 0x2012, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) setsockopt(r2, 0x10e, 0xb, &(0x7f0000000100)='\x00\x00', 0x2) sendmsg(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) accept4(r1, &(0x7f00000000c0)=@ax25={{0x3, @rose}, [@rose, @netrom, @netrom, @netrom, @default, @null, @default, @null]}, &(0x7f0000000140)=0x80, 0x80800) r4 = socket$netlink(0x10, 0x3, 0x9) sendmsg(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="23000000190007041dfffd946f610500020000001f00000000000800050016000400ff", 0x23}], 0x1}, 0x0) 00:49:39 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) open(&(0x7f0000000100)='./file0\x00', 0x880c2, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 280.829970][ T7925] EXT4-fs (loop1): invalid first ino: 3552596263 [ 280.850640][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 280.850656][ T27] audit: type=1326 audit(1583282979.021:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7934 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0x0 00:49:39 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000000)=""/133, &(0x7f00000000c0)=0x85) 00:49:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 00:49:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:49:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0xc0010015, 0x10]}) 00:49:39 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000), 0x200) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x519000, 0x600fb0f, 0x2012, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) setsockopt(r2, 0x10e, 0xb, &(0x7f0000000100)='\x00\x00', 0x2) sendmsg(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) accept4(r1, &(0x7f00000000c0)=@ax25={{0x3, @rose}, [@rose, @netrom, @netrom, @netrom, @default, @null, @default, @null]}, &(0x7f0000000140)=0x80, 0x80800) r4 = socket$netlink(0x10, 0x3, 0x9) sendmsg(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="23000000190007041dfffd946f610500020000001f00000000000800050016000400ff", 0x23}], 0x1}, 0x0) 00:49:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) [ 281.293049][ T7974] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 281.630117][ T27] audit: type=1326 audit(1583282979.801:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7934 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0x0 00:49:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) syz_emit_ethernet(0x6f, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, {0x0, 0x4e22, 0x4d, 0x0, @gue={{0x2}, "509601bbd1aaf55fda96609edd489d6326f711c902bc4009bcdbe86b02cf50d030d686318922289001ec9a62505ab3f2c3cb852718f05217e6c7f3d29b"}}}}}}, 0x0) 00:49:39 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) sendmmsg$inet(r0, &(0x7f0000001bc0)=[{{&(0x7f00000001c0)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000001480)=[@ip_retopts={{0xc}}, @ip_retopts={{0xc}}, @ip_retopts={{0x10, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}], 0x28}}], 0x1, 0x0) 00:49:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/61, 0x18) getdents64(r0, &(0x7f0000000280)=""/4096, 0x1000) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000401}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44045}, 0x4048405) 00:49:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 00:49:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80041270, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x9e]}) 00:49:39 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r0, 0x1000000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x101202, 0x0) sendfile(r1, r0, 0x0, 0xeefffdef) 00:49:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:49:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/61, 0x18) getdents64(r0, &(0x7f0000000280)=""/4096, 0x1000) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000401}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44045}, 0x4048405) 00:49:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="a235eb760d0a026a98f22ac888e8d054e926681099fcbcf33b506f6731ca59dabbc5e62c000000800000000042e9b7705f3ac01ba41d3143b809287450d50de73f", 0x41) 00:49:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x2ff, 0x10]}) 00:49:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:49:40 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006a0003"], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0x14) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 00:49:40 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f00000000c0)) 00:49:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/61, 0x18) getdents64(r0, &(0x7f0000000280)=""/4096, 0x1000) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000401}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44045}, 0x4048405) 00:49:40 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r0, 0x1000000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x101202, 0x0) sendfile(r1, r0, 0x0, 0xeefffdef) [ 282.226470][ T8028] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 00:49:40 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x200, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x15555555555555f8, &(0x7f0000000140)=[{&(0x7f0000000b40), 0x700}], 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') socket$inet6(0xa, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000780)={@dev={0xfe, 0x80, [], 0x2a}, 0x60}) r1 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f00000000c0)="dde20f100fc1c79a93edf7e95ad2a3ceb954bf7b28df4f7b25", 0x19, 0x0, 0x0, 0x0) 00:49:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:49:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) [ 282.457108][ T8049] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 00:49:40 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) getpgrp(0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 00:49:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:49:40 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x200, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x15555555555555f8, &(0x7f0000000140)=[{&(0x7f0000000b40), 0x700}], 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') socket$inet6(0xa, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000780)={@dev={0xfe, 0x80, [], 0x2a}, 0x60}) r1 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f00000000c0)="dde20f100fc1c79a93edf7e95ad2a3ceb954bf7b28df4f7b25", 0x19, 0x0, 0x0, 0x0) 00:49:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:49:40 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r0, 0x1000000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x101202, 0x0) sendfile(r1, r0, 0x0, 0xeefffdef) [ 282.790202][ T8068] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 00:49:41 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006a0003"], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0x14) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 00:49:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:49:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:49:41 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) getpgrp(0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 00:49:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x101}, 0x14}}, 0x0) 00:49:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@ipv4={[], [], @remote}, 0x131}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xa1}, {0x0}, {&(0x7f0000000140)=""/62, 0x3b}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 283.116544][ T8090] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 00:49:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x101}, 0x14}}, 0x0) 00:49:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:49:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x101}, 0x14}}, 0x0) 00:49:43 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:49:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:43 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006a0003"], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0x14) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 285.778517][ T8125] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 285.796110][ T8125] CPU: 0 PID: 8125 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 285.804754][ T8125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.814807][ T8125] Call Trace: [ 285.819770][ T8125] dump_stack+0x11d/0x187 [ 285.820385][ T8126] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 285.824117][ T8125] schedule_timeout+0x25d/0x280 [ 285.824140][ T8125] ? __local_bh_enable_ip+0x3f/0x80 [ 285.824157][ T8125] ? _raw_spin_unlock_bh+0x3d/0x50 [ 285.824174][ T8125] ? release_sock+0x132/0x160 [ 285.824248][ T8125] vsock_stream_connect+0x452/0x720 [ 285.824314][ T8125] ? finish_wait+0x80/0x80 [ 285.862922][ T8125] ? vsock_dgram_connect+0x250/0x250 [ 285.868256][ T8125] __sys_connect_file+0xdc/0xf0 [ 285.873263][ T8125] __sys_connect+0x11b/0x150 [ 285.877893][ T8125] ? _copy_to_user+0x7d/0xb0 [ 285.882487][ T8125] ? put_timespec64+0x91/0xc0 [ 285.887166][ T8125] __x64_sys_connect+0x48/0x60 [ 285.891928][ T8125] do_syscall_64+0xc7/0x390 [ 285.896448][ T8125] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 285.902340][ T8125] RIP: 0033:0x45c479 [ 285.906260][ T8125] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:49:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 285.926439][ T8125] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 285.934928][ T8125] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 285.943001][ T8125] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 285.951002][ T8125] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 285.958974][ T8125] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 285.967000][ T8125] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c [ 286.042483][ T8125] schedule_timeout: wrong timeout value fffdd0c26c63f143 [ 286.049556][ T8125] CPU: 0 PID: 8125 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 286.058141][ T8125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.068199][ T8125] Call Trace: [ 286.071506][ T8125] dump_stack+0x11d/0x187 [ 286.075974][ T8125] schedule_timeout+0x25d/0x280 [ 286.080854][ T8125] ? __local_bh_enable_ip+0x2e/0x80 [ 286.086073][ T8125] ? _raw_spin_unlock_bh+0x3d/0x50 00:49:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 00:49:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) [ 286.091194][ T8125] ? release_sock+0x132/0x160 [ 286.095878][ T8125] vsock_stream_connect+0x452/0x720 [ 286.101159][ T8125] ? finish_wait+0x80/0x80 [ 286.105595][ T8125] ? vsock_dgram_connect+0x250/0x250 [ 286.111053][ T8125] __sys_connect_file+0xdc/0xf0 [ 286.115950][ T8125] __sys_connect+0x11b/0x150 [ 286.120650][ T8125] ? _copy_to_user+0x7d/0xb0 [ 286.125256][ T8125] ? put_timespec64+0x91/0xc0 [ 286.130016][ T8125] __x64_sys_connect+0x48/0x60 [ 286.134864][ T8125] do_syscall_64+0xc7/0x390 [ 286.139384][ T8125] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 286.145299][ T8125] RIP: 0033:0x45c479 [ 286.149468][ T8125] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.174880][ T8125] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 286.183416][ T8125] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 286.191392][ T8125] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 286.199366][ T8125] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.207338][ T8125] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 286.215343][ T8125] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:49:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 00:49:44 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) [ 286.431301][ T8155] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 286.438680][ T8155] CPU: 1 PID: 8155 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 286.447275][ T8155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.457329][ T8155] Call Trace: [ 286.460688][ T8155] dump_stack+0x11d/0x187 [ 286.465066][ T8155] schedule_timeout+0x25d/0x280 [ 286.469935][ T8155] ? __local_bh_enable_ip+0x3f/0x80 [ 286.475157][ T8155] ? _raw_spin_unlock_bh+0x3d/0x50 [ 286.480386][ T8155] ? release_sock+0x132/0x160 [ 286.485063][ T8155] vsock_stream_connect+0x452/0x720 [ 286.490370][ T8155] ? finish_wait+0x80/0x80 [ 286.494816][ T8155] ? vsock_dgram_connect+0x250/0x250 [ 286.500869][ T8155] __sys_connect_file+0xdc/0xf0 [ 286.505734][ T8155] __sys_connect+0x11b/0x150 [ 286.510313][ T8155] ? _copy_to_user+0x7d/0xb0 [ 286.514900][ T8155] ? put_timespec64+0x91/0xc0 [ 286.520337][ T8155] __x64_sys_connect+0x48/0x60 [ 286.525092][ T8155] do_syscall_64+0xc7/0x390 [ 286.529644][ T8155] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 286.535530][ T8155] RIP: 0033:0x45c479 [ 286.539467][ T8155] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.559157][ T8155] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 286.567550][ T8155] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 286.575568][ T8155] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 286.583570][ T8155] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.591551][ T8155] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 286.599611][ T8155] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:49:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:49:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000012c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x16, r3, 0xfffffffffffffffb) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="aa12fa632704d0926b0e6ae7c6c1e410e40861a0788b5a09658cf0d09a893599428c6d622fcab35d13b21104275ddd951b74464c35cec0932f34d94598c0d5e86b5b86d86a766e6bdec878460d5a0e8aa9facb744cb3322118e7ac3a95860a711e6f467e89c74b59b7dd8dfb2eae0fa4b66e6988c6badc97aad8f42c80563638190b159310475ebb02b3f473e003ba75e01ba2664e412b3978a167f7add8ac7d5ffa11f940595cbfd71be63bb64d63cefca8fe8466d67fd2d76dbaeceb363190c532dd836be834fbffe03d09d21eeae23be0780df77365aa9a208f7bed0a9aca51efb688556b7e1b245f9841", 0xec, r3) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, 0x0, 0x1) 00:49:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:46 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006a0003"], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0x14) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 00:49:46 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) [ 288.827663][ T8166] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 288.847112][ T8166] CPU: 0 PID: 8166 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 288.855790][ T8166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.865851][ T8166] Call Trace: [ 288.869237][ T8166] dump_stack+0x11d/0x187 [ 288.873615][ T8166] schedule_timeout+0x25d/0x280 [ 288.878485][ T8166] ? __local_bh_enable_ip+0x3f/0x80 [ 288.883724][ T8166] ? _raw_spin_unlock_bh+0x3d/0x50 [ 288.888937][ T8166] ? release_sock+0x132/0x160 [ 288.889522][ T8172] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 288.893626][ T8166] vsock_stream_connect+0x452/0x720 [ 288.893650][ T8166] ? finish_wait+0x80/0x80 [ 288.893707][ T8166] ? vsock_dgram_connect+0x250/0x250 [ 288.918508][ T8166] __sys_connect_file+0xdc/0xf0 [ 288.923373][ T8166] __sys_connect+0x11b/0x150 00:49:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) [ 288.928198][ T8166] ? _copy_to_user+0x7d/0xb0 [ 288.933291][ T8166] ? put_timespec64+0x91/0xc0 [ 288.938066][ T8166] __x64_sys_connect+0x48/0x60 [ 288.942966][ T8166] do_syscall_64+0xc7/0x390 [ 288.947574][ T8166] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 288.953466][ T8166] RIP: 0033:0x45c479 [ 288.957457][ T8166] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:49:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nfsfs\x00') fchdir(r0) syz_read_part_table(0x0, 0x0, 0x0) [ 288.977070][ T8166] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 288.985492][ T8166] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 288.993465][ T8166] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 289.001529][ T8166] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 289.009511][ T8166] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 289.017491][ T8166] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:49:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:49:47 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) [ 289.287665][ T8199] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 289.310053][ T8199] CPU: 1 PID: 8199 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 289.318713][ T8199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.328773][ T8199] Call Trace: [ 289.332098][ T8199] dump_stack+0x11d/0x187 [ 289.336511][ T8199] schedule_timeout+0x25d/0x280 [ 289.341356][ T8199] ? __local_bh_enable_ip+0x3f/0x80 [ 289.346595][ T8199] ? _raw_spin_unlock_bh+0x3d/0x50 [ 289.351699][ T8199] ? release_sock+0x132/0x160 [ 289.356381][ T8199] vsock_stream_connect+0x452/0x720 [ 289.361613][ T8199] ? finish_wait+0x80/0x80 [ 289.366835][ T8199] ? vsock_dgram_connect+0x250/0x250 [ 289.372241][ T8199] __sys_connect_file+0xdc/0xf0 [ 289.378040][ T8199] __sys_connect+0x11b/0x150 [ 289.382686][ T8199] ? _copy_to_user+0x7d/0xb0 [ 289.387290][ T8199] ? put_timespec64+0x91/0xc0 [ 289.391982][ T8199] __x64_sys_connect+0x48/0x60 [ 289.397831][ T8199] do_syscall_64+0xc7/0x390 [ 289.402409][ T8199] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 289.408287][ T8199] RIP: 0033:0x45c479 [ 289.412187][ T8199] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.431785][ T8199] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 289.440185][ T8199] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 289.448239][ T8199] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 289.456352][ T8199] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 289.464561][ T8199] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 289.472573][ T8199] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:49:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:49:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) 00:49:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:50 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pipe(0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 00:49:50 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) shutdown(r1, 0x0) 00:49:50 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006a0003"], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0x14) 00:49:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 291.970692][ T27] audit: type=1804 audit(1583282990.141:33): pid=8213 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir173777755/syzkaller.8Zgqkk/27/bus" dev="sda1" ino=16594 res=1 00:49:50 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) shutdown(r1, 0x0) 00:49:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) 00:49:50 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) shutdown(r1, 0x0) [ 292.230487][ T27] audit: type=1800 audit(1583282990.401:34): pid=8213 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16594 res=0 00:49:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) accept4(r0, 0x0, 0x0, 0x0) [ 292.316093][ T27] audit: type=1804 audit(1583282990.421:35): pid=8222 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir173777755/syzkaller.8Zgqkk/27/bus" dev="sda1" ino=16594 res=1 00:49:53 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pipe(0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 00:49:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:49:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:53 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:49:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:49:53 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006a0003"], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0x14) [ 295.071158][ T8257] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 295.083426][ T27] audit: type=1804 audit(1583282993.261:36): pid=8254 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir173777755/syzkaller.8Zgqkk/28/bus" dev="sda1" ino=16606 res=1 [ 295.111548][ T8257] CPU: 1 PID: 8257 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 295.120334][ T8257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.131519][ T8257] Call Trace: [ 295.134862][ T8257] dump_stack+0x11d/0x187 [ 295.139201][ T8257] schedule_timeout+0x25d/0x280 [ 295.144054][ T8257] ? __local_bh_enable_ip+0x3f/0x80 [ 295.149270][ T8257] ? _raw_spin_unlock_bh+0x3d/0x50 [ 295.154390][ T8257] ? release_sock+0x132/0x160 [ 295.159068][ T8257] vsock_stream_connect+0x452/0x720 [ 295.164282][ T8257] ? finish_wait+0x80/0x80 [ 295.168759][ T8257] ? vsock_dgram_connect+0x250/0x250 [ 295.174134][ T8257] __sys_connect_file+0xdc/0xf0 [ 295.179203][ T8257] __sys_connect+0x11b/0x150 [ 295.183791][ T8257] ? _copy_to_user+0x7d/0xb0 [ 295.188379][ T8257] ? put_timespec64+0x91/0xc0 [ 295.193059][ T8257] __x64_sys_connect+0x48/0x60 [ 295.197833][ T8257] do_syscall_64+0xc7/0x390 [ 295.202351][ T8257] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.208348][ T8257] RIP: 0033:0x45c479 [ 295.212324][ T8257] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.232026][ T8257] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 295.240458][ T8257] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 295.248541][ T8257] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 295.256517][ T8257] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 00:49:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) [ 295.264798][ T8257] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 295.273119][ T8257] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:49:53 executing program 0: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 00:49:53 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:49:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:49:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) [ 295.634510][ T8281] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 295.646308][ T8281] CPU: 1 PID: 8281 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 295.654928][ T8281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.665055][ T8281] Call Trace: [ 295.668362][ T8281] dump_stack+0x11d/0x187 [ 295.672729][ T8281] schedule_timeout+0x25d/0x280 [ 295.677584][ T8281] ? __local_bh_enable_ip+0x2e/0x80 [ 295.682783][ T8281] ? _raw_spin_unlock_bh+0x3d/0x50 [ 295.687906][ T8281] ? release_sock+0x132/0x160 [ 295.693467][ T8281] vsock_stream_connect+0x452/0x720 [ 295.698681][ T8281] ? finish_wait+0x80/0x80 [ 295.703213][ T8281] ? vsock_dgram_connect+0x250/0x250 [ 295.708523][ T8281] __sys_connect_file+0xdc/0xf0 [ 295.713394][ T8281] __sys_connect+0x11b/0x150 [ 295.717985][ T8281] ? _copy_to_user+0x7d/0xb0 [ 295.722576][ T8281] ? put_timespec64+0x91/0xc0 [ 295.727242][ T8281] __x64_sys_connect+0x48/0x60 [ 295.732011][ T8281] do_syscall_64+0xc7/0x390 [ 295.736593][ T8281] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.742470][ T8281] RIP: 0033:0x45c479 [ 295.746356][ T8281] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.766038][ T8281] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 295.774490][ T8281] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 295.782463][ T8281] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 295.790435][ T8281] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 295.798389][ T8281] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 295.806352][ T8281] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:49:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:49:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:56 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:49:56 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006a0003"], 0x1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0x14) 00:49:56 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:49:56 executing program 0: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 00:49:56 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:49:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) [ 298.158914][ T8303] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 298.176061][ T8303] CPU: 1 PID: 8303 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 298.184699][ T8303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.194752][ T8303] Call Trace: [ 298.198056][ T8303] dump_stack+0x11d/0x187 [ 298.202506][ T8303] schedule_timeout+0x25d/0x280 [ 298.207426][ T8303] ? __local_bh_enable_ip+0x3f/0x80 [ 298.212676][ T8303] ? _raw_spin_unlock_bh+0x3d/0x50 [ 298.217913][ T8303] ? release_sock+0x132/0x160 [ 298.222616][ T8303] vsock_stream_connect+0x452/0x720 [ 298.227963][ T8303] ? finish_wait+0x80/0x80 [ 298.232574][ T8303] ? vsock_dgram_connect+0x250/0x250 [ 298.237884][ T8303] __sys_connect_file+0xdc/0xf0 [ 298.242754][ T8303] __sys_connect+0x11b/0x150 [ 298.247482][ T8303] ? _copy_to_user+0x7d/0xb0 [ 298.253394][ T8303] ? put_timespec64+0x91/0xc0 [ 298.258180][ T8303] __x64_sys_connect+0x48/0x60 [ 298.262975][ T8303] do_syscall_64+0xc7/0x390 [ 298.267499][ T8303] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.273390][ T8303] RIP: 0033:0x45c479 [ 298.277307][ T8303] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.296918][ T8303] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 00:49:56 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:49:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) [ 298.305352][ T8303] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 298.313331][ T8303] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 298.321323][ T8303] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 298.329433][ T8303] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 298.337411][ T8303] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:49:56 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r2) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:49:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) [ 298.521326][ T8324] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 298.538503][ T8324] CPU: 1 PID: 8324 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 298.547161][ T8324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.557218][ T8324] Call Trace: [ 298.560517][ T8324] dump_stack+0x11d/0x187 [ 298.564851][ T8324] schedule_timeout+0x25d/0x280 [ 298.569740][ T8324] ? __local_bh_enable_ip+0x3f/0x80 [ 298.574962][ T8324] ? _raw_spin_unlock_bh+0x3d/0x50 [ 298.580069][ T8324] ? release_sock+0x132/0x160 [ 298.584832][ T8324] vsock_stream_connect+0x452/0x720 [ 298.590052][ T8324] ? finish_wait+0x80/0x80 [ 298.594455][ T8324] ? vsock_dgram_connect+0x250/0x250 [ 298.599728][ T8324] __sys_connect_file+0xdc/0xf0 [ 298.604579][ T8324] __sys_connect+0x11b/0x150 [ 298.609169][ T8324] ? _copy_to_user+0x7d/0xb0 [ 298.613777][ T8324] ? put_timespec64+0x91/0xc0 [ 298.618475][ T8324] __x64_sys_connect+0x48/0x60 [ 298.623259][ T8324] do_syscall_64+0xc7/0x390 [ 298.627780][ T8324] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.633672][ T8324] RIP: 0033:0x45c479 [ 298.637868][ T8324] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.657463][ T8324] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 298.666730][ T8324] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 298.674700][ T8324] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 298.682664][ T8324] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 298.690782][ T8324] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 298.698828][ T8324] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:49:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:49:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:49:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:59 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r2) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:49:59 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006a0003"], 0x1}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 00:49:59 executing program 0: openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) unshare(0x20000000) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sigaltstack(&(0x7f0000804000/0x1000)=nil, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r1, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) [ 301.213156][ T8340] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 301.225853][ T8340] CPU: 0 PID: 8340 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 301.234650][ T8340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.244979][ T8340] Call Trace: [ 301.248307][ T8340] dump_stack+0x11d/0x187 [ 301.252655][ T8340] schedule_timeout+0x25d/0x280 [ 301.257532][ T8340] ? __local_bh_enable_ip+0x3f/0x80 [ 301.262762][ T8340] ? _raw_spin_unlock_bh+0x3d/0x50 [ 301.268006][ T8340] ? release_sock+0x132/0x160 [ 301.272776][ T8340] vsock_stream_connect+0x452/0x720 [ 301.278053][ T8340] ? finish_wait+0x80/0x80 [ 301.282657][ T8340] ? vsock_dgram_connect+0x250/0x250 [ 301.287984][ T8340] __sys_connect_file+0xdc/0xf0 [ 301.292948][ T8340] __sys_connect+0x11b/0x150 [ 301.297559][ T8340] ? _copy_to_user+0x7d/0xb0 [ 301.302171][ T8340] ? put_timespec64+0x91/0xc0 [ 301.306863][ T8340] __x64_sys_connect+0x48/0x60 [ 301.311645][ T8340] do_syscall_64+0xc7/0x390 [ 301.316174][ T8340] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 301.322088][ T8340] RIP: 0033:0x45c479 [ 301.325999][ T8340] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.352234][ T8340] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 00:49:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:49:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) [ 301.360654][ T8340] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 301.368906][ T8340] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 301.376998][ T8340] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 301.385058][ T8340] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 301.393098][ T8340] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:49:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:49:59 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r2) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:49:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) [ 301.604841][ T8362] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 301.625422][ T8362] CPU: 0 PID: 8362 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 301.634044][ T8362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.644098][ T8362] Call Trace: [ 301.647433][ T8362] dump_stack+0x11d/0x187 00:49:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) [ 301.651789][ T8362] schedule_timeout+0x25d/0x280 [ 301.656803][ T8362] ? __local_bh_enable_ip+0x3f/0x80 [ 301.662122][ T8362] ? _raw_spin_unlock_bh+0x3d/0x50 [ 301.667290][ T8362] ? release_sock+0x132/0x160 [ 301.671980][ T8362] vsock_stream_connect+0x452/0x720 [ 301.677335][ T8362] ? finish_wait+0x80/0x80 [ 301.681765][ T8362] ? vsock_dgram_connect+0x250/0x250 [ 301.687143][ T8362] __sys_connect_file+0xdc/0xf0 [ 301.692047][ T8362] __sys_connect+0x11b/0x150 [ 301.696863][ T8362] ? _copy_to_user+0x7d/0xb0 [ 301.701470][ T8362] ? put_timespec64+0x91/0xc0 [ 301.706288][ T8362] __x64_sys_connect+0x48/0x60 [ 301.711078][ T8362] do_syscall_64+0xc7/0x390 [ 301.715653][ T8362] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 301.721557][ T8362] RIP: 0033:0x45c479 [ 301.725550][ T8362] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.745288][ T8362] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 301.754780][ T8362] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 301.762748][ T8362] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 301.770719][ T8362] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 301.778765][ T8362] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 301.786723][ T8362] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c [ 303.523034][ T0] NOHZ: local_softirq_pending 08 00:50:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:50:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:50:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:50:02 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:50:02 executing program 0: openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) unshare(0x20000000) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sigaltstack(&(0x7f0000804000/0x1000)=nil, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r1, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:50:02 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006a0003"], 0x1}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 304.297291][ T8380] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 304.319711][ T8380] CPU: 0 PID: 8380 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 304.328603][ T8380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.338657][ T8380] Call Trace: [ 304.341984][ T8380] dump_stack+0x11d/0x187 00:50:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:50:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) [ 304.346417][ T8380] schedule_timeout+0x25d/0x280 [ 304.351278][ T8380] ? __local_bh_enable_ip+0x3f/0x80 [ 304.356485][ T8380] ? _raw_spin_unlock_bh+0x3d/0x50 [ 304.361604][ T8380] ? release_sock+0x132/0x160 [ 304.366297][ T8380] vsock_stream_connect+0x452/0x720 [ 304.371516][ T8380] ? finish_wait+0x80/0x80 [ 304.376054][ T8380] ? vsock_dgram_connect+0x250/0x250 [ 304.381363][ T8380] __sys_connect_file+0xdc/0xf0 [ 304.386228][ T8380] __sys_connect+0x11b/0x150 [ 304.390838][ T8380] ? _copy_to_user+0x7d/0xb0 [ 304.395446][ T8380] ? put_timespec64+0x91/0xc0 [ 304.400204][ T8380] __x64_sys_connect+0x48/0x60 [ 304.404989][ T8380] do_syscall_64+0xc7/0x390 [ 304.409509][ T8380] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 304.415396][ T8380] RIP: 0033:0x45c479 [ 304.419328][ T8380] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.438943][ T8380] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 304.447477][ T8380] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 304.455455][ T8380] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 304.463516][ T8380] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.471486][ T8380] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 304.479466][ T8380] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:50:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:50:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) 00:50:02 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:50:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:50:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) [ 304.758326][ T8408] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 304.777368][ T8408] CPU: 0 PID: 8408 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 304.786033][ T8408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.796095][ T8408] Call Trace: [ 304.799544][ T8408] dump_stack+0x11d/0x187 [ 304.803894][ T8408] schedule_timeout+0x25d/0x280 [ 304.808760][ T8408] ? __local_bh_enable_ip+0x2e/0x80 [ 304.813966][ T8408] ? _raw_spin_unlock_bh+0x3d/0x50 [ 304.819199][ T8408] ? release_sock+0x132/0x160 [ 304.823889][ T8408] vsock_stream_connect+0x452/0x720 [ 304.829239][ T8408] ? finish_wait+0x80/0x80 [ 304.833776][ T8408] ? vsock_dgram_connect+0x250/0x250 [ 304.839159][ T8408] __sys_connect_file+0xdc/0xf0 [ 304.844068][ T8408] __sys_connect+0x11b/0x150 [ 304.848665][ T8408] ? _copy_to_user+0x7d/0xb0 [ 304.854050][ T8408] ? put_timespec64+0x91/0xc0 [ 304.858743][ T8408] __x64_sys_connect+0x48/0x60 [ 304.863518][ T8408] do_syscall_64+0xc7/0x390 [ 304.868036][ T8408] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 304.873986][ T8408] RIP: 0033:0x45c479 [ 304.877893][ T8408] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.897502][ T8408] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 00:50:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) [ 304.906102][ T8408] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 304.914423][ T8408] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 304.922400][ T8408] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.930367][ T8408] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 304.938349][ T8408] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:50:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:50:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:50:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 00:50:05 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:50:05 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006a0003"], 0x1}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 00:50:05 executing program 0: openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) unshare(0x20000000) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sigaltstack(&(0x7f0000804000/0x1000)=nil, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r1, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:50:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 00:50:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) [ 307.457955][ T8432] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 307.508672][ T8432] CPU: 1 PID: 8432 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 307.517433][ T8432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.527493][ T8432] Call Trace: [ 307.530804][ T8432] dump_stack+0x11d/0x187 [ 307.535173][ T8432] schedule_timeout+0x25d/0x280 [ 307.540046][ T8432] ? __local_bh_enable_ip+0x2e/0x80 [ 307.545257][ T8432] ? _raw_spin_unlock_bh+0x3d/0x50 [ 307.550442][ T8432] ? release_sock+0x132/0x160 [ 307.555321][ T8432] vsock_stream_connect+0x452/0x720 [ 307.560579][ T8432] ? finish_wait+0x80/0x80 [ 307.565081][ T8432] ? vsock_dgram_connect+0x250/0x250 [ 307.570481][ T8432] __sys_connect_file+0xdc/0xf0 [ 307.575356][ T8432] __sys_connect+0x11b/0x150 [ 307.580016][ T8432] ? _copy_to_user+0x7d/0xb0 [ 307.584640][ T8432] ? put_timespec64+0x91/0xc0 [ 307.589416][ T8432] __x64_sys_connect+0x48/0x60 [ 307.594202][ T8432] do_syscall_64+0xc7/0x390 [ 307.598723][ T8432] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 307.604620][ T8432] RIP: 0033:0x45c479 00:50:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 307.608535][ T8432] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.628451][ T8432] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 307.636973][ T8432] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 307.645140][ T8432] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 00:50:05 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet(r0, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) [ 307.653225][ T8432] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 307.661234][ T8432] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 307.669213][ T8432] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:50:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 00:50:05 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) [ 307.930123][ T8460] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 307.955803][ T8460] CPU: 0 PID: 8460 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 307.964428][ T8460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.974477][ T8460] Call Trace: [ 307.977759][ T8460] dump_stack+0x11d/0x187 [ 307.982078][ T8460] schedule_timeout+0x25d/0x280 [ 307.986944][ T8460] ? __local_bh_enable_ip+0x3f/0x80 [ 307.992158][ T8460] ? _raw_spin_unlock_bh+0x3d/0x50 [ 307.997356][ T8460] ? release_sock+0x132/0x160 [ 308.002049][ T8460] vsock_stream_connect+0x452/0x720 [ 308.007272][ T8460] ? finish_wait+0x80/0x80 [ 308.011741][ T8460] ? vsock_dgram_connect+0x250/0x250 [ 308.017101][ T8460] __sys_connect_file+0xdc/0xf0 [ 308.021971][ T8460] __sys_connect+0x11b/0x150 [ 308.026652][ T8460] ? _copy_to_user+0x7d/0xb0 [ 308.031286][ T8460] ? put_timespec64+0x91/0xc0 [ 308.037891][ T8460] __x64_sys_connect+0x48/0x60 [ 308.042691][ T8460] do_syscall_64+0xc7/0x390 [ 308.047243][ T8460] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 308.053220][ T8460] RIP: 0033:0x45c479 [ 308.057123][ T8460] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.076747][ T8460] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 308.085190][ T8460] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 308.093150][ T8460] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 308.101199][ T8460] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 308.111730][ T8460] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 308.119701][ T8460] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:50:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:50:08 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet(r0, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:50:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 00:50:08 executing program 0: syz_emit_ethernet(0x8e, &(0x7f0000000180)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f000", 0x18, 0x3a, 0xff, @rand_addr="00000000000000000000000000008f10", @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x60, [], @local}}}}}}, 0x0) 00:50:08 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:50:08 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0x14) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 310.564409][ T8475] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 310.590115][ T8475] CPU: 0 PID: 8475 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 310.598727][ T8475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.608786][ T8475] Call Trace: [ 310.612097][ T8475] dump_stack+0x11d/0x187 [ 310.616445][ T8475] schedule_timeout+0x25d/0x280 [ 310.621308][ T8475] ? __local_bh_enable_ip+0x3f/0x80 [ 310.626574][ T8475] ? _raw_spin_unlock_bh+0x3d/0x50 [ 310.631692][ T8475] ? release_sock+0x132/0x160 [ 310.636383][ T8475] vsock_stream_connect+0x452/0x720 [ 310.641602][ T8475] ? finish_wait+0x80/0x80 [ 310.646103][ T8475] ? vsock_dgram_connect+0x250/0x250 [ 310.651402][ T8475] __sys_connect_file+0xdc/0xf0 [ 310.656262][ T8475] __sys_connect+0x11b/0x150 [ 310.660876][ T8475] ? _copy_to_user+0x7d/0xb0 [ 310.665476][ T8475] ? put_timespec64+0x91/0xc0 [ 310.670172][ T8475] __x64_sys_connect+0x48/0x60 [ 310.674959][ T8475] do_syscall_64+0xc7/0x390 [ 310.679485][ T8475] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 310.685372][ T8475] RIP: 0033:0x45c479 [ 310.689452][ T8475] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:50:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 00:50:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000740)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb13a522e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000b26a15940101013c5811039e15775027d7ce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000002000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newtfilter={0x74, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xffe0}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x44, 0x2, [@TCA_ROUTE4_POLICE={0x40, 0x3, [@TCA_POLICE_TBF={0x3c}]}]}}]}, 0x74}}, 0x0) 00:50:08 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet(r0, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:50:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c", 0x2) [ 310.709180][ T8475] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 310.717596][ T8475] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 [ 310.725576][ T8475] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 310.733551][ T8475] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 310.741565][ T8475] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 310.749544][ T8475] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:50:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c", 0x2) 00:50:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:50:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee0f0fc00008e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0970fe2b9a77f08add3eac478b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349faf11e931e7d6a4cf10ce619ad2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x45}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:50:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, 0x0}, 0x20) socket$inet6_udplite(0xa, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xffffffffffffff80) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x7c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x1a, 0x0, 0x0, &(0x7f0000001b40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001b80)={0x0, 0x8}, 0x8, 0x10, 0x0}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x2, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x13, 0x0, 0x0, 0x0, 0x1, 0xe3, &(0x7f0000000440)=""/227, 0x0, 0xe, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRES64], 0x8) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(r5) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r3, 0x0, r5, 0x0, 0x8100000, 0x0) splice(r0, 0x0, r4, 0x0, 0x8, 0x0) 00:50:11 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x6, &(0x7f0000000100), 0x5b3048225bb3f999) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) 00:50:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:50:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c", 0x2) 00:50:11 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast1}, 0x14) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 313.680885][ T8516] schedule_timeout: wrong timeout value fffdd0c26c641895 [ 313.693967][ T8516] CPU: 1 PID: 8516 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 313.702574][ T8516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.712681][ T8516] Call Trace: [ 313.716003][ T8516] dump_stack+0x11d/0x187 [ 313.720338][ T8516] schedule_timeout+0x25d/0x280 [ 313.725213][ T8516] ? __local_bh_enable_ip+0x2e/0x80 [ 313.730422][ T8516] ? _raw_spin_unlock_bh+0x3d/0x50 [ 313.735560][ T8516] ? release_sock+0x132/0x160 [ 313.740493][ T8516] vsock_stream_connect+0x452/0x720 [ 313.745993][ T8516] ? finish_wait+0x80/0x80 [ 313.750429][ T8516] ? vsock_dgram_connect+0x250/0x250 [ 313.755731][ T8516] __sys_connect_file+0xdc/0xf0 [ 313.760664][ T8516] __sys_connect+0x11b/0x150 [ 313.765271][ T8516] ? _copy_to_user+0x7d/0xb0 [ 313.769875][ T8516] ? put_timespec64+0x91/0xc0 [ 313.774583][ T8516] __x64_sys_connect+0x48/0x60 [ 313.779459][ T8516] do_syscall_64+0xc7/0x390 [ 313.783976][ T8516] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.789991][ T8516] RIP: 0033:0x45c479 [ 313.793910][ T8516] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.813517][ T8516] RSP: 002b:00007f81cc60ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 313.821980][ T8516] RAX: ffffffffffffffda RBX: 00007f81cc60b6d4 RCX: 000000000045c479 00:50:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7d", 0x3) 00:50:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7d", 0x3) 00:50:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) [ 313.829962][ T8516] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 313.837984][ T8516] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 313.846065][ T8516] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 313.854166][ T8516] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bf2c 00:50:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7d", 0x3) 00:50:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="721c7ddc", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2400000028000800000000000000000000000000a61d350f7c0b5299e14612d1bfc825e267cab522595252b42712955c6f7081410b06f736c6aa73c13bcd157368c0a83f12a0656543c245402d82b53a26f1b70af0a2", @ANYRES32=0x0, @ANYBLOB="07000000000000000c000f00"], 0x24}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$inet(r1, &(0x7f0000000300)=""/219, 0x200003db, 0x0, 0x0, 0x0) 00:50:12 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100), &(0x7f0000000340)=0x14) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r1, 0x0) [ 314.468345][ T8520] ================================================================== [ 314.476490][ T8520] BUG: KCSAN: data-race in pipe_double_lock / put_pipe_info [ 314.483763][ T8520] [ 314.486095][ T8520] write to 0xffff88809ade6068 of 4 bytes by task 8509 on cpu 1: [ 314.493733][ T8520] put_pipe_info+0x47/0xb0 [ 314.498160][ T8520] pipe_release+0x108/0x180 [ 314.502682][ T8520] __fput+0x1c3/0x4f0 [ 314.506713][ T8520] ____fput+0x1b/0x30 [ 314.510718][ T8520] task_work_run+0xf5/0x130 [ 314.515247][ T8520] exit_to_usermode_loop+0x2ae/0x2c0 [ 314.520554][ T8520] do_syscall_64+0x36e/0x390 [ 314.525156][ T8520] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.531048][ T8520] [ 314.533387][ T8520] read to 0xffff88809ade6068 of 4 bytes by task 8520 on cpu 0: [ 314.540951][ T8520] pipe_double_lock+0x8e/0x120 [ 314.545732][ T8520] do_splice+0x216/0xc30 [ 314.550159][ T8520] __x64_sys_splice+0x1fd/0x210 [ 314.555133][ T8520] do_syscall_64+0xc7/0x390 [ 314.559646][ T8520] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.565541][ T8520] [ 314.567860][ T8520] Reported by Kernel Concurrency Sanitizer on: [ 314.574102][ T8520] CPU: 0 PID: 8520 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 314.582666][ T8520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.592713][ T8520] ================================================================== [ 314.600818][ T8520] Kernel panic - not syncing: panic_on_warn set ... [ 314.607394][ T8520] CPU: 0 PID: 8520 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 314.616914][ T8520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.627086][ T8520] Call Trace: [ 314.630374][ T8520] dump_stack+0x11d/0x187 [ 314.634703][ T8520] panic+0x210/0x640 [ 314.638676][ T8520] ? vprintk_func+0x89/0x13a [ 314.643271][ T8520] kcsan_report.cold+0xc/0x14 [ 314.648169][ T8520] kcsan_setup_watchpoint+0x304/0x400 [ 314.653537][ T8520] pipe_double_lock+0x8e/0x120 [ 314.658341][ T8520] do_splice+0x216/0xc30 [ 314.662623][ T8520] __x64_sys_splice+0x1fd/0x210 [ 314.667492][ T8520] do_syscall_64+0xc7/0x390 [ 314.672025][ T8520] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.678009][ T8520] RIP: 0033:0x45c479 [ 314.681902][ T8520] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.701621][ T8520] RSP: 002b:00007fc38f5b8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 314.710204][ T8520] RAX: ffffffffffffffda RBX: 00007fc38f5b96d4 RCX: 000000000045c479 [ 314.718178][ T8520] RDX: 000000000000000a RSI: 0000000000000000 RDI: 0000000000000004 [ 314.726142][ T8520] RBP: 000000000076bfc0 R08: 0000000000000008 R09: 0000000000000000 [ 314.734271][ T8520] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 314.742244][ T8520] R13: 0000000000000b9f R14: 00000000004ce270 R15: 000000000076bfcc [ 314.751786][ T8520] Kernel Offset: disabled [ 314.756131][ T8520] Rebooting in 86400 seconds..