Warning: Permanently added '10.128.10.55' (ECDSA) to the list of known hosts. 2019/05/31 00:51:46 fuzzer started [ 70.400927] audit: type=1400 audit(1559263906.459:36): avc: denied { map } for pid=7767 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/05/31 00:51:49 dialing manager at 10.128.0.105:37607 2019/05/31 00:51:49 syscalls: 2457 2019/05/31 00:51:49 code coverage: enabled 2019/05/31 00:51:49 comparison tracing: enabled 2019/05/31 00:51:49 extra coverage: extra coverage is not supported by the kernel 2019/05/31 00:51:49 setuid sandbox: enabled 2019/05/31 00:51:49 namespace sandbox: enabled 2019/05/31 00:51:49 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/31 00:51:49 fault injection: enabled 2019/05/31 00:51:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/31 00:51:49 net packet injection: enabled 2019/05/31 00:51:49 net device setup: enabled 00:52:01 executing program 0: fchdir(0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aea01efc48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfffffef6) [ 85.158400] audit: type=1400 audit(1559263921.209:37): avc: denied { map } for pid=7784 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14301 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 85.248697] IPVS: ftp: loaded support on port[0] = 21 [ 85.258740] NET: Registered protocol family 30 [ 85.263474] Failed to register TIPC socket type 00:52:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x29a}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 85.587261] IPVS: ftp: loaded support on port[0] = 21 [ 85.604190] NET: Registered protocol family 30 [ 85.608811] Failed to register TIPC socket type 00:52:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x590}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 85.883904] IPVS: ftp: loaded support on port[0] = 21 [ 85.903358] NET: Registered protocol family 30 [ 85.907966] Failed to register TIPC socket type 00:52:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0xcc}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 86.176531] audit: type=1400 audit(1559263922.229:38): avc: denied { map } for pid=7767 comm="syz-fuzzer" path="/root/syzkaller-shm749763563" dev="sda1" ino=16505 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 86.413375] IPVS: ftp: loaded support on port[0] = 21 [ 86.433145] NET: Registered protocol family 30 [ 86.437759] Failed to register TIPC socket type 00:52:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0xa0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14}, {0x14, 0x2, @in={0x2, 0x0, @multicast2}}}}]}]}, 0xa0}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 86.952964] IPVS: ftp: loaded support on port[0] = 21 [ 86.982507] NET: Registered protocol family 30 [ 86.987147] Failed to register TIPC socket type 00:52:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x2c6}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 87.667765] IPVS: ftp: loaded support on port[0] = 21 [ 87.704252] NET: Registered protocol family 30 [ 87.708882] Failed to register TIPC socket type [ 88.308268] chnl_net:caif_netlink_parms(): no params data found [ 88.691797] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.698439] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.774982] device bridge_slave_0 entered promiscuous mode [ 88.832760] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.839234] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.911870] device bridge_slave_1 entered promiscuous mode [ 89.378173] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 89.704238] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 90.392781] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 90.521508] team0: Port device team_slave_0 added [ 90.871924] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 91.030702] team0: Port device team_slave_1 added [ 91.327674] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 91.532400] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 92.157164] device hsr_slave_0 entered promiscuous mode [ 92.362927] device hsr_slave_1 entered promiscuous mode [ 92.525176] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 92.668823] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 92.972579] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 93.604637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.777094] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 93.962621] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 93.968908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.013629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.202443] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 94.208682] 8021q: adding VLAN 0 to HW filter on device team0 [ 94.375816] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.553358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.580796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.690372] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.696924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.846538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.931318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 94.938658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.029858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.121139] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.127551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.242386] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 95.249757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.411633] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 95.418554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.572923] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 95.579846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.590855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.599725] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.758055] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 95.821598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.829582] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.929068] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 96.013175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.022766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.142741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 96.149969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.158539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.323459] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 96.329557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.490923] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 96.695473] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.884351] audit: type=1400 audit(1559263932.939:39): avc: denied { associate } for pid=7785 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 00:52:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYRESHEX], 0x12}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 00:52:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0xe4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdd17}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd29a}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14}, {0x14, 0x2, @in={0x2, 0x0, @multicast1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NET={0x4}]}, 0xe4}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0d4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a9f340ae955baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e00005480") 00:52:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40000000003, 0x11) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, 0x0}, 0x0) 00:52:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40000000003, 0x11) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, 0x0}, 0x0) 00:52:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40000000003, 0x11) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, 0x0}, 0x0) 00:52:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40000000003, 0x11) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, 0x0}, 0x0) [ 104.270650] IPVS: ftp: loaded support on port[0] = 21 [ 104.279882] NET: Registered protocol family 30 [ 104.290071] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 104.298125] WARNING: CPU: 1 PID: 8462 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 104.306122] Kernel panic - not syncing: panic_on_warn set ... [ 104.306122] [ 104.313504] CPU: 1 PID: 8462 Comm: syz-executor.0 Not tainted 4.19.46 #18 [ 104.320436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.329798] Call Trace: [ 104.332393] [ 104.334572] dump_stack+0x172/0x1f0 [ 104.338223] panic+0x263/0x507 [ 104.341448] ? __warn_printk+0xf3/0xf3 [ 104.345353] ? kmem_cache_free.cold+0x1c/0x23 [ 104.349871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.355443] ? __warn.cold+0x5/0x4a [ 104.359090] ? __warn+0xe8/0x1d0 [ 104.362473] ? kmem_cache_free.cold+0x1c/0x23 [ 104.366980] __warn.cold+0x20/0x4a [ 104.370546] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 104.375145] ? kmem_cache_free.cold+0x1c/0x23 [ 104.379662] report_bug+0x263/0x2b0 [ 104.382318] Failed to register TIPC socket type [ 104.383307] do_error_trap+0x204/0x360 [ 104.391884] ? math_error+0x340/0x340 [ 104.395710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.401276] ? wake_up_klogd+0x99/0xd0 [ 104.405177] ? error_entry+0x76/0xd0 [ 104.408901] ? trace_hardirqs_off_caller+0x65/0x220 [ 104.413931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 104.418782] do_invalid_op+0x1b/0x20 [ 104.422524] invalid_op+0x14/0x20 [ 104.425988] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 104.431091] Code: e8 25 8d 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 40 45 54 87 48 c7 c7 18 64 38 88 49 8b 54 24 58 e8 34 43 b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 40 45 54 87 48 c7 c7 18 [ 104.450024] RSP: 0018:ffff8880ae907cf8 EFLAGS: 00010286 [ 104.455577] RAX: 0000000000000046 RBX: ffff8880a094b700 RCX: 0000000000000000 [ 104.462853] RDX: 0000000000000000 RSI: ffffffff81559e76 RDI: ffffed1015d20f91 [ 104.470172] RBP: ffff8880ae907d18 R08: 0000000000000046 R09: ffffed1015d24fe9 [ 104.477457] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffff88808183ad80 [ 104.484741] R13: 0000000000000000 R14: ffff88808183ad80 R15: ffff8880a094ba10 [ 104.492040] ? vprintk_func+0x86/0x189 [ 104.495952] ? kmem_cache_free.cold+0x1c/0x23 [ 104.500460] __sk_destruct+0x4b4/0x6d0 [ 104.504361] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 104.509749] sk_destruct+0x7b/0x90 [ 104.513299] __sk_free+0xce/0x300 [ 104.516756] sk_free+0x42/0x50 [ 104.519958] tipc_sk_callback+0x48/0x60 [ 104.523943] rcu_process_callbacks+0xba0/0x1a30 [ 104.528645] ? __rcu_read_unlock+0x170/0x170 [ 104.533058] ? sched_clock+0x2e/0x50 [ 104.536787] __do_softirq+0x25c/0x921 [ 104.540594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.546152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.551702] irq_exit+0x180/0x1d0 [ 104.555175] smp_apic_timer_interrupt+0x13b/0x550 [ 104.560061] apic_timer_interrupt+0xf/0x20 [ 104.564377] [ 104.566617] RIP: 0010:debug_smp_processor_id+0x9/0x20 [ 104.571813] Code: e9 a8 fe ff ff 4c 89 45 d0 e8 33 da 7c fe 4c 8b 45 d0 e9 74 fe ff ff 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 e8 67 78 46 fe <48> c7 c6 a0 ad 81 87 48 c7 c7 e0 ad 81 87 e8 54 fd ff ff 5d c3 66 [ 104.590729] RSP: 0018:ffff8880698cf838 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 104.598455] RAX: ffff888088dfc3c0 RBX: 0000000000023980 RCX: 0000000000000002 [ 104.605749] RDX: 0000000000000000 RSI: ffffffff83248719 RDI: ffff888088dfcc3c [ 104.613022] RBP: ffff8880698cf838 R08: ffff888088dfc3c0 R09: 0000000000000000 [ 104.620310] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a1a699c0 [ 104.627589] R13: ffffffff813e248d R14: ffffffff813e248d R15: 00000000000011ae [ 104.634888] ? vm_area_free+0x1d/0x30 [ 104.638693] ? vm_area_free+0x1d/0x30 [ 104.642567] ? debug_smp_processor_id+0x9/0x20 [ 104.647243] ? debug_smp_processor_id+0x9/0x20 [ 104.651841] rcu_dynticks_curr_cpu_in_eqs+0x17/0xb0 [ 104.656864] rcu_is_watching+0x10/0x30 [ 104.660757] rcu_read_lock_sched_held+0x8e/0x130 [ 104.665517] kmem_cache_free+0x222/0x260 [ 104.669583] vm_area_free+0x1d/0x30 [ 104.673213] remove_vma+0x13f/0x180 [ 104.676851] exit_mmap+0x369/0x530 [ 104.680396] ? __ia32_sys_munmap+0x80/0x80 [ 104.684645] ? __khugepaged_exit+0x2da/0x400 [ 104.689083] ? rcu_read_lock_sched_held+0x110/0x130 [ 104.694131] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 104.699686] ? __khugepaged_exit+0xcf/0x400 [ 104.704021] mmput+0x15f/0x4c0 [ 104.707218] do_exit+0x838/0x2fa0 [ 104.710689] ? get_signal+0x331/0x1d50 [ 104.714589] ? mm_update_next_owner+0x660/0x660 [ 104.719270] ? _raw_spin_unlock_irq+0x28/0x90 [ 104.723769] ? get_signal+0x331/0x1d50 [ 104.727656] ? _raw_spin_unlock_irq+0x28/0x90 [ 104.732159] do_group_exit+0x135/0x370 [ 104.736068] get_signal+0x399/0x1d50 [ 104.739790] ? __might_fault+0x12b/0x1e0 [ 104.743864] do_signal+0x95/0x1950 [ 104.747423] ? setup_sigcontext+0x7d0/0x7d0 [ 104.751756] ? kasan_check_read+0x11/0x20 [ 104.755929] ? _copy_to_user+0xc9/0x120 [ 104.759927] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 104.765487] ? __x64_sys_futex+0x40d/0x590 [ 104.769739] ? exit_to_usermode_loop+0x43/0x2c0 [ 104.774415] ? do_syscall_64+0x53d/0x620 [ 104.778483] ? exit_to_usermode_loop+0x43/0x2c0 [ 104.783162] ? lockdep_hardirqs_on+0x415/0x5d0 [ 104.787758] ? trace_hardirqs_on+0x67/0x220 [ 104.792099] exit_to_usermode_loop+0x244/0x2c0 [ 104.796694] do_syscall_64+0x53d/0x620 [ 104.800602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.805793] RIP: 0033:0x459279 [ 104.809451] Code: 76 1b 48 8b 0e 48 8b 17 48 83 c6 08 48 83 c7 08 48 83 eb 08 48 39 d1 74 e3 c6 00 00 c3 48 8b 4c 1e f8 48 8b 54 1f f8 48 39 d1 <0f> 94 00 c3 48 83 fb 00 74 37 48 8d 0c dd 00 00 00 00 48 f7 d9 40 [ 104.828357] RSP: 002b:00007ff8ce7e0cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 104.836076] RAX: fffffffffffffe00 RBX: 000000000075bf28 RCX: 0000000000459279 [ 104.843598] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf28 [ 104.850872] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 104.858145] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf2c [ 104.865419] R13: 00007fff92a52e7f R14: 00007ff8ce7e19c0 R15: 000000000075bf2c [ 104.873874] Kernel Offset: disabled [ 104.877577] Rebooting in 86400 seconds..