BUG: sleeping function called from invalid context at net/core/sock.c:2761 in_atomic(): 1, irqs_disabled(): 0, pid: 1403, name: kworker/1:2 2 locks held by kworker/1:2/1403: #0: ((wq_completion)"%s"name){+.+.}, at: [] __write_once_size include/linux/compiler.h:212 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic_long_set include/asm-generic/atomic-long.h:57 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_data kernel/workqueue.c:618 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:645 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2083 #1: ((work_completion)(&squeue->work)){+.+.}, at: [] process_one_work+0xb2f/0x1be0 kernel/workqueue.c:2087 CPU: 1 PID: 1403 Comm: kworker/1:2 Not tainted 4.15.0-rc1+ #197 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: pdecrypt padata_serial_worker Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6060 __might_sleep+0x95/0x190 kernel/sched/core.c:6013 lock_sock_nested+0x37/0x110 net/core/sock.c:2761 lock_sock include/net/sock.h:1465 [inline] af_alg_async_cb+0x86/0x1a0 crypto/af_alg.c:1039 aead_request_complete include/crypto/internal/aead.h:75 [inline] pcrypt_aead_serial+0x75/0xa0 crypto/pcrypt.c:123 padata_serial_worker+0x476/0x750 kernel/padata.c:348 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2112 worker_thread+0x223/0x1990 kernel/workqueue.c:2246 kthread+0x37a/0x440 kernel/kthread.c:238 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:441 netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. sg_write: data in/out 1562545402/1 bytes for SCSI command 0x0-- guessing data in; program syz-executor6 not setting count and/or reply_len properly SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65502 sclass=netlink_route_socket pig=25243 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65502 sclass=netlink_route_socket pig=25249 comm=syz-executor1 sg_write: data in/out 822404280/197 bytes for SCSI command 0x12-- guessing data in; program syz-executor6 not setting count and/or reply_len properly device gre0 entered promiscuous mode binder: 25394:25398 IncRefs 0 refcount change on invalid ref 2 ret -22 binder: 25394:25398 Acquire 1 refcount change on invalid ref 4 ret -22 binder: 25394:25398 unknown command 0 binder: 25394:25398 ioctl c0306201 20000fd0 returned -22 binder: BINDER_SET_CONTEXT_MGR already set binder: 25394:25398 ioctl 40046207 0 returned -16 binder_alloc: 25394: binder_alloc_buf, no vma binder: 25394:25398 transaction failed 29189/-3, size 255156491150087--17179869184 line 2870 binder: 25394:25411 ioctl c0306201 20000fd0 returned -14 binder: BINDER_SET_CONTEXT_MGR already set binder: 25394:25411 ioctl 40046207 0 returned -16 binder: BINDER_SET_CONTEXT_MGR already set binder: 25394:25398 ioctl 40046207 0 returned -16 binder_alloc: 25394: binder_alloc_buf, no vma binder: 25394:25411 transaction failed 29189/-3, size 255156491150087--17179869184 line 2870 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29189 kvm [25396]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008f data 0xf6e00513ff kvm [25396]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008e data 0xf6e00513ff SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pig=25481 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pig=25498 comm=syz-executor1 netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. audit: type=1326 audit(1511866592.578:12609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=25594 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511866592.592:12610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=25594 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=79 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511866592.592:12611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=25594 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 25576 Comm: syz-executor1 Tainted: G W 4.15.0-rc1+ #197 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3121 [inline] handle_pte_fault mm/memory.c:3934 [inline] __handle_mm_fault+0x2e8c/0x3ad0 mm/memory.c:4060 handle_mm_fault+0x334/0x8d0 mm/memory.c:4097 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1094 RIP: 0010:fault_in_pages_readable include/linux/pagemap.h:601 [inline] RIP: 0010:iov_iter_fault_in_readable+0x1a7/0x410 lib/iov_iter.c:421 RSP: 0018:ffff8801cd837928 EFLAGS: 00010246 RAX: 0000000000010000 RBX: 0000000020011fd2 RCX: ffffffff82505121 RDX: 00000000000000c6 RSI: ffffc90003e22000 RDI: ffff8801cd837d28 RBP: ffff8801cd837a08 R08: 1ffff1003863817a R09: 0000000000000000 R10: ffff8801cea8e240 R11: 0000000000000000 R12: 1ffff10039b06f28 R13: ffff8801cd8379e0 R14: 0000000000000000 R15: ffff8801cd837d20 generic_perform_write+0x200/0x600 mm/filemap.c:3129 __generic_file_write_iter+0x366/0x5b0 mm/filemap.c:3264 generic_file_write_iter+0x399/0x7a0 mm/filemap.c:3292 call_write_iter include/linux/fs.h:1772 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:482 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x4529d9 RSP: 002b:00007fbb64addc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007fbb64ade700 RCX: 00000000004529d9 RDX: 000000000000001c RSI: 0000000020011fd2 RDI: 0000000000000014 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007fbb64ade9c0 R15: 0000000000000000 netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. audit: type=1326 audit(1511866592.592:12612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=25594 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=2 compat=0 ip=0x40cd11 code=0x7ffc0000 audit: type=1326 audit(1511866592.592:12613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=25594 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511866592.593:12614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=25594 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=78 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511866592.593:12615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=25594 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 binder: 25685:25687 IncRefs 0 refcount change on invalid ref -3 ret -22 do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app binder: 25685:25700 DecRefs 0 refcount change on invalid ref 0 ret -22 binder: 25685:25700 unknown command 0 binder: 25685:25700 ioctl c0306201 20008000 returned -22 binder: 25685:25700 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 25685:25700 got reply transaction with no transaction stack binder: 25685:25700 transaction failed 29201/-71, size 72-16 line 2670 binder: 25685:25704 DecRefs 0 refcount change on invalid ref 0 ret -22 binder: 25685:25704 unknown command 0 binder: 25685:25704 ioctl c0306201 20008000 returned -22 binder: 25685:25700 unknown command 44 binder: 25685:25700 ioctl c0306201 2000bfd0 returned -22 do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app binder: 25685:25715 unknown command 0 binder: 25685:25715 ioctl c0306201 20007000 returned -22 binder_alloc: binder_alloc_mmap_handler: 25740 20005000-20009000 already mapped failed -16 binder: BINDER_SET_CONTEXT_MGR already set binder: 25740:25746 ioctl 40046207 0 returned -16 binder: 25685:25687 unknown command 8 binder: 25685:25687 ioctl c0306201 2000bfd0 returned -22 binder: undelivered TRANSACTION_ERROR: 29201 binder: BINDER_SET_CONTEXT_MGR already set binder: 25740:25746 ioctl 40046207 0 returned -16 binder_alloc: binder_alloc_mmap_handler: 25740 20005000-20009000 already mapped failed -16 binder: BINDER_SET_CONTEXT_MGR already set binder: 25740:25749 ioctl 40046207 0 returned -16 kauditd_printk_skb: 62 callbacks suppressed audit: type=1326 audit(1511866593.983:12678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=25757 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0xffff0000 binder: release 25740:25746 transaction 229 out, still active binder: undelivered TRANSACTION_COMPLETE audit: type=1326 audit(1511866594.070:12679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=25757 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0xffff0000 binder: send failed reply for transaction 229, target dead netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. binder: 25898:25901 ioctl c0306201 20958fd0 returned -14 binder: 25898:25918 IncRefs 0 refcount change on invalid ref 1 ret -22 binder: 25898:25918 got reply transaction with no transaction stack binder: 25898:25918 transaction failed 29201/-71, size 0-48 line 2670 binder: 25898:25939 Release 1 refcount change on invalid ref 4 ret -22 binder: 25898:25918 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 25898:25918 ioctl 40046205 ff returned -22 binder: BINDER_SET_CONTEXT_MGR already set binder: 25898:25918 ioctl 40046207 0 returned -16 binder: BINDER_SET_CONTEXT_MGR already set binder: 25898:25955 ioctl 40046207 0 returned -16 binder: 25898:25918 IncRefs 0 refcount change on invalid ref 1 ret -22 binder: 25898:25918 got reply transaction with no transaction stack binder: 25898:25918 transaction failed 29201/-71, size 0-48 line 2670 binder: 25898:25955 Release 1 refcount change on invalid ref 4 ret -22 binder: 25898:25955 IncRefs 0 refcount change on invalid ref 3 ret -22 binder: 25898:25955 Release 1 refcount change on invalid ref 2 ret -22 binder: 25898:25955 BC_ACQUIRE_DONE u0000000000000000 no match binder: 25955 RLIMIT_NICE not set binder: 25898:25958 unknown command 1784877669 binder: 25898:25958 ioctl c0306201 2000c000 returned -22 binder: 25898:25958 ioctl 40046205 ff returned -22 binder: 25898:25939 IncRefs 0 refcount change on invalid ref 3 ret -22 binder: 25898:25939 Release 1 refcount change on invalid ref 2 ret -22 binder: 25898:25939 BC_ACQUIRE_DONE node 233 has no pending acquire request binder: 25939 RLIMIT_NICE not set binder: undelivered TRANSACTION_ERROR: 29201 netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. audit: type=1326 audit(1511866595.579:12680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=26029 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0xffff0000 audit: type=1326 audit(1511866595.718:12681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=26029 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0xffff0000 device gre0 entered promiscuous mode syz-executor1: vmalloc: allocation failure: 12549619712 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor1 cpuset=/ mems_allowed=0 CPU: 0 PID: 26087 Comm: syz-executor1 Tainted: G W 4.15.0-rc1+ #197 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 warn_alloc+0x19a/0x2b0 mm/page_alloc.c:3292 __vmalloc_node_range+0x4f0/0x650 mm/vmalloc.c:1775 __vmalloc_node mm/vmalloc.c:1804 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1826 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:540 [inline] kvmalloc_array include/linux/mm.h:556 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1610 net/ipv4/netfilter/ip_tables.c:686 do_replace net/ipv4/netfilter/ip_tables.c:1149 [inline] do_ipt_set_ctl+0x34b/0x5c0 net/ipv4/netfilter/ip_tables.c:1683 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115 ip_setsockopt+0xa1/0xb0 net/ipv4/ip_sockglue.c:1256 raw_setsockopt+0xb7/0xd0 net/ipv4/raw.c:850 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2968 SYSC_setsockopt net/socket.c:1851 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1830 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x4529d9 RSP: 002b:00007fbb64addc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000000008a RCX: 00000000004529d9 RDX: 0000000000000040 RSI: 0000000000000000 RDI: 000000000000001a RBP: 00000000204f7000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000020002000 R11: 0000000000000212 R12: 00000000006f54e8 R13: 00000000ffffffff R14: 00007fbb64ade6d4 R15: 0000000000000000 Mem-Info: active_anon:159260 inactive_anon:33 isolated_anon:0 active_file:3946 inactive_file:7109 isolated_file:0 unevictable:1 dirty:143 writeback:0 unstable:0 slab_reclaimable:9542 slab_unreclaimable:102722 mapped:22984 shmem:59 pagetables:991 bounce:0 free:1323482 free_pcp:348 free_cma:0 Node 0 active_anon:637040kB inactive_anon:132kB active_file:15784kB inactive_file:28436kB unevictable:4kB isolated(anon):0kB isolated(file):0kB mapped:91936kB dirty:572kB writeback:0kB shmem:236kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 77824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:160kB low:200kB high:240kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2882 6395 6395 Node 0 DMA32 free:2953184kB min:30384kB low:37980kB high:45576kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953952kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:764kB local_pcp:128kB free_cma:0kB lowmem_reserve[]: 0 0 3513 3513 Node 0 Normal free:2324836kB min:37032kB low:46288kB high:55544kB active_anon:637040kB inactive_anon:132kB active_file:15784kB inactive_file:28436kB unevictable:4kB writepending:572kB present:4718592kB managed:3597640kB mlocked:0kB kernel_stack:4832kB pagetables:3964kB bounce:0kB free_pcp:628kB local_pcp:352kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 2*4kB (M) 3*8kB (UM) 2*16kB (M) 1*32kB (U) 4*64kB (UM) 3*128kB (M) 5*256kB (UM) 4*512kB (UM) 2*1024kB (UM) 3*2048kB (UM) 718*4096kB (M) = 2953184kB Node 0 Normal: 327*4kB (UME) 301*8kB (UME) 935*16kB (UME) 802*32kB (UME) 1484*64kB (UME) 364*128kB (UM) 123*256kB (UME) 40*512kB (UM) 20*1024kB (UM) 5*2048kB (UME) 502*4096kB (UM) = 2324788kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 11114 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 324104 pages reserved syz-executor1: vmalloc: allocation failure: 12549619712 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor1 cpuset=/ mems_allowed=0 CPU: 0 PID: 26087 Comm: syz-executor1 Tainted: G W 4.15.0-rc1+ #197 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 warn_alloc+0x19a/0x2b0 mm/page_alloc.c:3292 __vmalloc_node_range+0x4f0/0x650 mm/vmalloc.c:1775 __vmalloc_node mm/vmalloc.c:1804 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1826 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:540 [inline] kvmalloc_array include/linux/mm.h:556 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1610 net/ipv4/netfilter/ip_tables.c:686 do_replace net/ipv4/netfilter/ip_tables.c:1149 [inline] do_ipt_set_ctl+0x34b/0x5c0 net/ipv4/netfilter/ip_tables.c:1683 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115 ip_setsockopt+0xa1/0xb0 net/ipv4/ip_sockglue.c:1256 raw_setsockopt+0xb7/0xd0 net/ipv4/raw.c:850 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2968 SYSC_setsockopt net/socket.c:1851 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1830 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x4529d9 RSP: 002b:00007fbb64addc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000000008a RCX: 00000000004529d9 RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000022 RBP: 00000000204f7000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000020002000 R11: 0000000000000212 R12: 00000000006f54e8 R13: 00000000ffffffff R14: 00007fbb64ade6d4 R15: 0000000000000000 kvm [26090]: vcpu0, guest rIP: 0x0 Hyper-V uhandled wrmsr: 0x40000087 data 0xaa4 kvm [26090]: vcpu0, guest rIP: 0x0 Hyper-V uhandled wrmsr: 0x40000087 data 0xaa4 QAT: Invalid ioctl QAT: Invalid ioctl sock: sock_set_timeout: `syz-executor6' (pid 26242) tries to set negative timeout sock: sock_set_timeout: `syz-executor6' (pid 26242) tries to set negative timeout device syz5 entered promiscuous mode IPv6: ADDRCONF(NETDEV_UP): syz5: link is not ready cgroup: cgroup2: unknown option "" nla_parse: 12 callbacks suppressed netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. cgroup: cgroup2: unknown option "" netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. PF_BRIDGE: br_mdb_parse() with invalid ifindex sock: sock_set_timeout: `syz-executor6' (pid 26375) tries to set negative timeout binder: 26379:26386 DecRefs 0 refcount change on invalid ref 0 ret -22 PF_BRIDGE: br_mdb_parse() with invalid ifindex binder: 26379:26382 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 26379:26382 got transaction to invalid handle binder: 26379:26382 transaction failed 29201/-22, size 32-8 line 2755 binder: 26379:26382 ioctl 40046205 7f returned -22 binder: 26379:26382 BC_FREE_BUFFER u0000000020000000 matched unreturned buffer binder_alloc: 26379:26382 FREE_BUFFER u0000000020000000 user freed buffer twice 9pnet_virtio: no channels available for device ./file0 QAT: Invalid ioctl 9pnet_virtio: no channels available for device ./file0 binder: 26379:26386 got reply transaction with no transaction stack binder: 26379:26386 transaction failed 29201/-71, size 48-0 line 2670 sock: sock_set_timeout: `syz-executor6' (pid 26421) tries to set negative timeout QAT: Invalid ioctl binder: BINDER_SET_CONTEXT_MGR already set binder: 26379:26433 ioctl 40046207 0 returned -16 binder: 26379:26386 DecRefs 0 refcount change on invalid ref 0 ret -22 binder: 26386 RLIMIT_NICE not set binder: 26379:26433 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 26379:26433 got transaction to invalid handle binder: 26379:26433 transaction failed 29201/-22, size 32-8 line 2755 binder: 26379:26437 ioctl 40046205 7f returned -22 binder: 26379:26433 BC_FREE_BUFFER u0000000020000000 no match binder: 26379:26440 BC_FREE_BUFFER u0000000020000000 no match binder: 26379:26433 got reply transaction with no transaction stack binder: 26379:26433 transaction failed 29201/-71, size 48-0 line 2670 binder: 26379:26382 BC_FREE_BUFFER u0000000020000000 no match binder_alloc: 26379: binder_alloc_buf, no vma binder: 26379:26437 transaction failed 29189/-3, size 0-0 line 2870 binder_alloc: 26379: binder_alloc_buf, no vma binder: 26379:26440 transaction failed 29189/-3, size 0-0 line 2870 binder: 26379:26382 got new transaction with bad transaction stack, transaction 240 has target 26379:0 binder: 26379:26382 transaction failed 29201/-71, size 0-0 line 2782 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29189 binder: release 26379:26382 transaction 240 out, still active binder: undelivered TRANSACTION_COMPLETE binder: undelivered TRANSACTION_ERROR: 29201 binder: send failed reply for transaction 240, target dead netlink: 5 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor1'. QAT: Invalid ioctl pit: kvm: requested 838 ns i8254 timer period limited to 500000 ns dccp_invalid_packet: P.CsCov 5 exceeds packet length 552 QAT: Invalid ioctl pit: kvm: requested 838 ns i8254 timer period limited to 500000 ns QAT: Invalid ioctl QAT: Invalid ioctl netlink: 11 bytes leftover after parsing attributes in process `syz-executor7'. dccp_invalid_packet: P.CsCov 5 exceeds packet length 552 netlink: 11 bytes leftover after parsing attributes in process `syz-executor7'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53369 sclass=netlink_route_socket pig=26607 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=26635 comm=syz-executor1 device lo entered promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=26635 comm=syz-executor1 kvm [26612]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008f data 0xe0000011 kvm [26612]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008e data 0xe0000011 kvm [26612]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008d data 0xe0000011 kvm [26612]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008c data 0xe0000011 kvm [26612]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008b data 0xe0000011