Warning: Permanently added '10.128.1.12' (ECDSA) to the list of known hosts. 2019/06/03 03:27:25 fuzzer started [ 54.736818] audit: type=1400 audit(1559532445.884:36): avc: denied { map } for pid=7749 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/03 03:27:28 dialing manager at 10.128.0.105:38455 2019/06/03 03:27:29 syscalls: 2457 2019/06/03 03:27:29 code coverage: enabled 2019/06/03 03:27:29 comparison tracing: enabled 2019/06/03 03:27:29 extra coverage: extra coverage is not supported by the kernel 2019/06/03 03:27:29 setuid sandbox: enabled 2019/06/03 03:27:29 namespace sandbox: enabled 2019/06/03 03:27:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/03 03:27:29 fault injection: enabled 2019/06/03 03:27:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/03 03:27:29 net packet injection: enabled 2019/06/03 03:27:29 net device setup: enabled 03:27:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac8ac6f99a83f3982554f99d4329f65901d9a43b88ba2f9bad017f613f1600ce61c16d280671e167db620e993377f583b3a31f2b09fb4a565adb152b3e3a1ffdb621ca7b58cc7a5090fe4e004a2964ea3e1da248228ce3d9493e083135c13110ae3ebe0afdaf46674641dc2d19abc949f48ee32cac5f137738a1e3b3f644d3cdc4728e37df64a205ba9bc35edc9daa9f7cb1d69a75751ec976"], 0x99}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 85.399827] audit: type=1400 audit(1559532476.544:37): avc: denied { map } for pid=7768 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1097 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 85.522686] IPVS: ftp: loaded support on port[0] = 21 [ 85.533572] NET: Registered protocol family 30 [ 85.538173] Failed to register TIPC socket type 03:27:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100030e000000030000000000000005000600000000000a0000400000000400000000000000000000002100004000000100000000000002000100010000fdff00000200fd000005000500000000000a004872bbb6896209000000000000009aec3f3f7710aa000000ff1700050000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x8000000000000e3, 0x0) [ 85.701930] IPVS: ftp: loaded support on port[0] = 21 [ 85.711415] NET: Registered protocol family 30 [ 85.716281] Failed to register TIPC socket type 03:27:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x80000000, 0x2) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='$\x00') ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="b1ee91cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2160f01c4c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") syz_execute_func(&(0x7f0000000a80)="c4a17b2dd04a2ae9c442c9f7d742980f050d427ce444c4a37bf0c50241e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c08fe978e125001000020f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53aff2f0438391000080205f8466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000340)=""/164) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000100)={0x0, 0x8, 0x4, "e4d50ce8"}, 0xc) [ 86.156285] IPVS: ftp: loaded support on port[0] = 21 [ 86.176803] NET: Registered protocol family 30 [ 86.181424] Failed to register TIPC socket type 03:27:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x24}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 86.539224] IPVS: ftp: loaded support on port[0] = 21 [ 86.567179] NET: Registered protocol family 30 [ 86.571784] Failed to register TIPC socket type 03:27:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="020000ff770100000000000000000000750118000000990be4af704a6d3c8dcdbd99133f335d8b0e6906aa8d076b29f1a2cd3e8c8cd2016182c53e0b2d438de689494ed4e56111d075fa1b84e861c7f37bf277618badf95c22de79baaa4f6cdfab66"], 0x62}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") [ 87.148729] IPVS: ftp: loaded support on port[0] = 21 [ 87.187190] NET: Registered protocol family 30 [ 87.191802] Failed to register TIPC socket type 03:27:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x74, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x74}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 87.710617] IPVS: ftp: loaded support on port[0] = 21 [ 87.737406] NET: Registered protocol family 30 [ 87.742107] Failed to register TIPC socket type [ 88.267525] chnl_net:caif_netlink_parms(): no params data found [ 88.715975] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.747470] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.804183] device bridge_slave_0 entered promiscuous mode [ 88.884465] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.891020] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.954960] device bridge_slave_1 entered promiscuous mode [ 89.392261] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 89.850190] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 90.459556] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 90.645836] team0: Port device team_slave_0 added [ 90.878327] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 91.024521] team0: Port device team_slave_1 added [ 91.234953] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 91.555432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 92.431207] device hsr_slave_0 entered promiscuous mode [ 92.768786] device hsr_slave_1 entered promiscuous mode [ 93.122279] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 93.389025] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 93.944928] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 94.925958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.195673] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 95.494567] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 95.500828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.525443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.756276] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 95.762403] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.086069] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 96.213126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.221342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.333573] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.340109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.570137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 96.713242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.759839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.833615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.893628] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.900036] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.145548] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 97.152816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 97.157358] IPVS: ftp: loaded support on port[0] = 21 [ 97.308879] NET: Registered protocol family 30 [ 97.385606] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 97.404623] Failed to register TIPC socket type [ 97.484136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 97.673996] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 97.681649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 97.704310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.900647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 98.013553] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 98.020966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 98.168883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 98.272875] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 98.403262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 98.553824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 98.577722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 98.686025] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 98.874851] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 98.880945] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 99.066765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 99.113590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.214014] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 99.375889] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 99.604272] audit: type=1400 audit(1559532490.744:38): avc: denied { associate } for pid=7769 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 100.511066] IPVS: ftp: loaded support on port[0] = 21 [ 100.580334] NET: Registered protocol family 30 [ 100.626466] Failed to register TIPC socket type 03:28:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac8ac6f99a83f3982554f99d4329f65901d9a43b88ba2f9bad017f613f1600ce61c16d280671e167db620e993377f583b3a31f2b09fb4a565adb152b3e3a1ffdb621ca7b58cc7a5090fe4e004a2964ea3e1da248228ce3d9493e083135c13110ae3ebe0afdaf46674641dc2d19abc949f48ee32cac5f137738a1e3b3f644d3cdc4728e37df64a205ba9bc35edc9daa9f7cb1d69a75751ec976"], 0x99}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 101.627821] IPVS: ftp: loaded support on port[0] = 21 [ 101.637122] NET: Registered protocol family 30 [ 101.641726] Failed to register TIPC socket type 03:28:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac8ac6f99a83f3982554f99d4329f65901d9a43b88ba2f9bad017f613f1600ce61c16d280671e167db620e993377f583b3a31f2b09fb4a565adb152b3e3a1ffdb621ca7b58cc7a5090fe4e004a2964ea3e1da248228ce3d9493e083135c13110ae3ebe0afdaf46674641dc2d19abc949f48ee32cac5f137738a1e3b3f644d3cdc4728e37df64a205ba9bc35edc9daa9f7cb1d69a75751ec976"], 0x99}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 102.257166] IPVS: ftp: loaded support on port[0] = 21 [ 102.276954] NET: Registered protocol family 30 [ 102.281662] Failed to register TIPC socket type [ 102.780590] IPVS: ftp: loaded support on port[0] = 21 [ 102.800186] NET: Registered protocol family 30 [ 102.828490] Failed to register TIPC socket type 03:28:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac8ac6f99a83f3982554f99d4329f65901d9a43b88ba2f9bad017f613f1600ce61c16d280671e167db620e993377f583b3a31f2b09fb4a565adb152b3e3a1ffdb621ca7b58cc7a5090fe4e004a2964ea3e1da248228ce3d9493e083135c13110ae3ebe0afdaf46674641dc2d19abc949f48ee32cac5f137738a1e3b3f644d3cdc4728e37df64a205ba9bc35edc9daa9f7cb1d69a75751ec976"], 0x99}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 03:28:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) 03:28:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) 03:28:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) [ 104.313663] hrtimer: interrupt took 27470 ns 03:28:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) [ 104.388328] IPVS: ftp: loaded support on port[0] = 21 [ 104.427133] NET: Registered protocol family 30 [ 104.431760] Failed to register TIPC socket type [ 104.433006] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 104.444566] WARNING: CPU: 0 PID: 8438 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 104.452723] Kernel panic - not syncing: panic_on_warn set ... [ 104.452723] [ 104.460097] CPU: 0 PID: 8438 Comm: syz-executor.5 Not tainted 4.19.47 #19 [ 104.467028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.476385] Call Trace: [ 104.479018] [ 104.481189] dump_stack+0x172/0x1f0 [ 104.484849] panic+0x263/0x507 [ 104.488046] ? __warn_printk+0xf3/0xf3 [ 104.491942] ? kmem_cache_free.cold+0x1c/0x23 [ 104.496460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.502003] ? __warn.cold+0x5/0x4a [ 104.505631] ? __warn+0xe8/0x1d0 [ 104.509007] ? kmem_cache_free.cold+0x1c/0x23 [ 104.513518] __warn.cold+0x20/0x4a [ 104.517083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.523744] ? kmem_cache_free.cold+0x1c/0x23 [ 104.528267] report_bug+0x263/0x2b0 [ 104.531904] do_error_trap+0x204/0x360 [ 104.535798] ? math_error+0x340/0x340 [ 104.539784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.545326] ? wake_up_klogd+0x99/0xd0 [ 104.549434] ? error_entry+0x76/0xd0 [ 104.560358] ? trace_hardirqs_off_caller+0x65/0x220 [ 104.565387] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 104.570261] do_invalid_op+0x1b/0x20 [ 104.573997] invalid_op+0x14/0x20 [ 104.577473] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 104.582581] Code: e8 95 ab 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 66 38 88 49 8b 54 24 58 e8 44 3d b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 [ 104.601497] RSP: 0018:ffff8880ae807cf8 EFLAGS: 00010286 [ 104.606878] RAX: 0000000000000046 RBX: ffff888078dec340 RCX: 0000000000000000 [ 104.614152] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed1015d00f91 [ 104.621429] RBP: ffff8880ae807d18 R08: 0000000000000046 R09: ffffed1015d04fe9 [ 104.628705] R10: ffffed1015d04fe8 R11: ffff8880ae827f47 R12: ffff88808f81a900 [ 104.635978] R13: 0000000000000000 R14: ffff88808f81a900 R15: ffff888078dec650 [ 104.643273] ? vprintk_func+0x86/0x189 [ 104.647173] ? kmem_cache_free.cold+0x1c/0x23 [ 104.651672] __sk_destruct+0x4b4/0x6d0 [ 104.655575] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 104.660949] sk_destruct+0x7b/0x90 [ 104.664505] __sk_free+0xce/0x300 [ 104.667961] sk_free+0x42/0x50 [ 104.671162] tipc_sk_callback+0x48/0x60 [ 104.675313] rcu_process_callbacks+0xba0/0x1a30 [ 104.679992] ? ___preempt_schedule_notrace+0x16/0x2f [ 104.685107] ? __rcu_read_unlock+0x170/0x170 [ 104.689705] ? __lock_is_held+0xb6/0x140 [ 104.693782] __do_softirq+0x25c/0x921 [ 104.697681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.703235] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 104.708789] irq_exit+0x180/0x1d0 [ 104.712258] smp_apic_timer_interrupt+0x13b/0x550 [ 104.717112] apic_timer_interrupt+0xf/0x20 [ 104.721343] [ 104.723588] RIP: 0010:lock_acquire+0x1ea/0x3f0 [ 104.728172] Code: 7c 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 c4 01 00 00 48 83 3d ca d0 1f 07 00 0f 84 38 01 00 00 48 8b 7d c8 57 9d <0f> 1f 44 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 65 8b [ 104.747257] RSP: 0018:ffff888064fffb58 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 104.754983] RAX: 1ffffffff10e46c9 RBX: ffff888083bee000 RCX: 00000000125cef8f [ 104.762257] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 0000000000000282 [ 104.769538] RBP: ffff888064fffba0 R08: 0000000000000000 R09: 0000000000000001 [ 104.776811] R10: ffff888083bee8a8 R11: 7cd6c7618ea1509d R12: ffffffff8879d7e0 [ 104.784186] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 104.791510] inet_twsk_purge+0xc0/0x5f0 [ 104.795488] ? inet_twsk_purge+0x7e/0x5f0 [ 104.799650] ? ip_queue_xmit+0x70/0x70 [ 104.803539] ? dccp_v4_exit_batch+0x20/0x20 [ 104.807870] dccp_v4_exit_batch+0x1a/0x20 [ 104.812024] ops_exit_list.isra.0+0xfc/0x150 [ 104.816439] setup_net+0x400/0x740 [ 104.820007] ? ops_init+0x410/0x410 [ 104.823649] copy_net_ns+0x1df/0x340 [ 104.827369] create_new_namespaces+0x400/0x7b0 [ 104.831994] unshare_nsproxy_namespaces+0xc2/0x200 [ 104.836948] ksys_unshare+0x440/0x980 [ 104.840763] ? walk_process_tree+0x2c0/0x2c0 [ 104.845184] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 104.849943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.855316] ? do_syscall_64+0x26/0x620 [ 104.859295] ? lockdep_hardirqs_on+0x415/0x5d0 [ 104.863889] __x64_sys_unshare+0x31/0x40 [ 104.867957] do_syscall_64+0xfd/0x620 [ 104.871769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.876959] RIP: 0033:0x45bd47 [ 104.880162] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 104.899071] RSP: 002b:00007fff936179b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 104.906790] RAX: ffffffffffffffda RBX: 000000000075c9a8 RCX: 000000000045bd47 [ 104.914062] RDX: 0000000000000000 RSI: 00007fff93617960 RDI: 0000000040000000 [ 104.921437] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 104.928815] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000075c9a8 [ 104.936088] R13: 00007fff93617c28 R14: 0000000000000000 R15: 0000000000000000 [ 104.944613] Kernel Offset: disabled [ 104.948338] Rebooting in 86400 seconds..