Warning: Permanently added '10.128.0.212' (ECDSA) to the list of known hosts. 2019/05/30 17:15:10 fuzzer started [ 55.867996] kauditd_printk_skb: 10 callbacks suppressed [ 55.868012] audit: type=1400 audit(1559236510.462:36): avc: denied { map } for pid=8074 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/05/30 17:15:13 dialing manager at 10.128.0.105:37607 2019/05/30 17:15:13 syscalls: 2457 2019/05/30 17:15:13 code coverage: enabled 2019/05/30 17:15:13 comparison tracing: enabled 2019/05/30 17:15:13 extra coverage: extra coverage is not supported by the kernel 2019/05/30 17:15:13 setuid sandbox: enabled 2019/05/30 17:15:13 namespace sandbox: enabled 2019/05/30 17:15:13 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/30 17:15:13 fault injection: enabled 2019/05/30 17:15:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/30 17:15:13 net packet injection: enabled 2019/05/30 17:15:13 net device setup: enabled 17:15:22 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 68.107476] audit: type=1400 audit(1559236522.702:37): avc: denied { map } for pid=8093 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1049 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 68.209307] IPVS: ftp: loaded support on port[0] = 21 [ 68.219982] NET: Registered protocol family 30 [ 68.224706] Failed to register TIPC socket type 17:15:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="20dc1f123c2c3f319bd070") setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa200f01e542f66188d0c4e1b19165ab39ff5bf9e2f90f0fcab0c442d1b6265ef04229894300000000bac7bae4c6c462a59be8240000dbc46440983af4ad660f3a62d45c48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae8a8a657c7c730f8052043822de0fa10000000026460f740346d9f880ba0000000083c442fd333fdf0804f4c441a5609c8ba800000054838b") [ 68.454984] IPVS: ftp: loaded support on port[0] = 21 [ 68.464639] NET: Registered protocol family 30 [ 68.469238] Failed to register TIPC socket type 17:15:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000180)="02cb61903010bc93adfc21d3d84ac1bfb819a00f6707", 0x0}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfdef) [ 68.944696] IPVS: ftp: loaded support on port[0] = 21 [ 68.965050] NET: Registered protocol family 30 [ 68.969660] Failed to register TIPC socket type 17:15:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)={0xc8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x2000}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 69.874395] IPVS: ftp: loaded support on port[0] = 21 [ 69.885188] NET: Registered protocol family 30 [ 69.889786] Failed to register TIPC socket type [ 70.289942] chnl_net:caif_netlink_parms(): no params data found [ 70.739874] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.810265] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.915512] device bridge_slave_0 entered promiscuous mode [ 71.002863] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.009336] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.162064] device bridge_slave_1 entered promiscuous mode [ 71.648105] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.986735] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.637685] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 72.831345] team0: Port device team_slave_0 added [ 73.055308] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.222218] team0: Port device team_slave_1 added [ 73.549080] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 73.841791] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.738500] device hsr_slave_0 entered promiscuous mode [ 74.992814] device hsr_slave_1 entered promiscuous mode [ 75.188619] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 75.431668] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 17:15:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x150, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x150}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 75.762734] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 76.656916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.803488] IPVS: ftp: loaded support on port[0] = 21 [ 76.872274] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.893783] NET: Registered protocol family 30 [ 76.898425] Failed to register TIPC socket type [ 77.063975] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.141275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.149474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.282746] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 77.288972] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.547225] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 77.636678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.651204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.756205] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.762825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.898429] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 77.972609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.980057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.080875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.151413] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.157805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.236011] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 78.311582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.380836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 78.391635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.521728] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 78.600369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.608443] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.741342] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 78.748551] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 78.770539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.850843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.935954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 79.007289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.015920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.104562] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 79.201648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.209434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.326135] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 79.404042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 79.526917] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 79.692738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.823505] audit: type=1400 audit(1559236534.422:38): avc: denied { associate } for pid=8094 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 17:15:35 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 17:15:36 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 17:15:37 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 17:15:38 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 83.766000] IPVS: ftp: loaded support on port[0] = 21 [ 83.826688] IPVS: ftp: loaded support on port[0] = 21 [ 83.842206] NET: Registered protocol family 30 [ 83.860161] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 83.868520] WARNING: CPU: 0 PID: 8092 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 83.877123] Kernel panic - not syncing: panic_on_warn set ... [ 83.877123] [ 83.884513] CPU: 0 PID: 8092 Comm: syz-fuzzer Not tainted 4.19.46 #18 [ 83.891273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.900655] Call Trace: [ 83.903260] [ 83.905553] dump_stack+0x172/0x1f0 [ 83.909226] panic+0x263/0x507 [ 83.912443] ? __warn_printk+0xf3/0xf3 [ 83.916341] ? kmem_cache_free.cold+0x1c/0x23 [ 83.920871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 83.926435] ? __warn.cold+0x5/0x4a [ 83.930075] ? __warn+0xe8/0x1d0 [ 83.933453] ? kmem_cache_free.cold+0x1c/0x23 [ 83.937956] __warn.cold+0x20/0x4a [ 83.941530] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 83.946225] ? kmem_cache_free.cold+0x1c/0x23 [ 83.950728] report_bug+0x263/0x2b0 [ 83.954375] do_error_trap+0x204/0x360 [ 83.958278] ? math_error+0x340/0x340 [ 83.962089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 83.967642] ? wake_up_klogd+0x99/0xd0 [ 83.971558] ? error_entry+0x76/0xd0 [ 83.975290] ? trace_hardirqs_off_caller+0x65/0x220 [ 83.980325] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 83.985188] do_invalid_op+0x1b/0x20 [ 83.988912] invalid_op+0x14/0x20 [ 83.992381] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 83.997505] Code: e8 25 8d 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 40 45 54 87 48 c7 c7 18 64 38 88 49 8b 54 24 58 e8 34 43 b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 40 45 54 87 48 c7 c7 18 [ 84.016431] RSP: 0018:ffff8880ae807cf8 EFLAGS: 00010286 [ 84.021912] RAX: 0000000000000046 RBX: ffff8880786ac580 RCX: 0000000000000000 [ 84.029190] RDX: 0000000000000000 RSI: ffffffff81559e76 RDI: ffffed1015d00f91 [ 84.036470] RBP: ffff8880ae807d18 R08: 0000000000000046 R09: ffffed1015d04fe9 [ 84.043751] R10: ffffed1015d04fe8 R11: ffff8880ae827f47 R12: ffff888085cd0600 [ 84.051026] R13: 0000000000000000 R14: ffff888085cd0600 R15: ffff8880786ac890 [ 84.058318] ? vprintk_func+0x86/0x189 [ 84.062214] ? kmem_cache_free.cold+0x1c/0x23 [ 84.067199] __sk_destruct+0x4b4/0x6d0 [ 84.071119] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 84.076507] sk_destruct+0x7b/0x90 [ 84.080063] __sk_free+0xce/0x300 [ 84.083541] sk_free+0x42/0x50 [ 84.086758] tipc_sk_callback+0x48/0x60 [ 84.090751] rcu_process_callbacks+0xba0/0x1a30 [ 84.095462] ? __rcu_read_unlock+0x170/0x170 [ 84.099889] ? __lock_is_held+0xb6/0x140 [ 84.103982] __do_softirq+0x25c/0x921 [ 84.107795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.113338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.118898] irq_exit+0x180/0x1d0 [ 84.122357] smp_apic_timer_interrupt+0x13b/0x550 [ 84.127210] apic_timer_interrupt+0xf/0x20 [ 84.131497] [ 84.133737] RIP: 0010:loop2+0x4c/0x39e [ 84.137626] Code: c4 63 7b f0 f2 06 41 21 d7 45 31 f5 c4 63 7b f0 e0 0d 45 31 d7 c4 63 7b f0 f0 16 89 c6 45 31 e6 c4 63 7b f0 e0 02 44 03 1c 3c <09> ce 45 31 e6 41 89 c4 21 de 41 21 cc 45 01 ef 45 01 d8 44 09 e6 [ 84.156527] RSP: 0018:ffff8880900071c0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 84.164240] RAX: 00000000e0ebfd6e RBX: 00000000d89205fd RCX: 00000000511dc465 [ 84.171516] RDX: 000000009b354bec RSI: 00000000e0ebfd6e RDI: 0000000000000180 [ 84.178788] RBP: ffff888090007458 R08: 00000000a91c03b2 R09: 00000000c507fbfc [ 84.186056] R10: 00000000d94e2eeb R11: 00000000d7b6faa8 R12: 00000000b83aff5b [ 84.193321] R13: 00000000555a45cb R14: 000000004482bcdc R15: 00000000c14f6fef [ 84.200669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.206208] ? sha256_update+0x1d2/0x200 [ 84.210271] ? done_hash+0x12/0x12 [ 84.213814] sha256_avx2_update+0x2d/0x40 [ 84.217995] crypto_shash_update+0xf2/0x2b0 [ 84.222338] ? ext4_xattr_get+0x197/0xa00 [ 84.226497] ? kasan_unpoison_shadow+0x35/0x50 [ 84.231090] ima_calc_file_hash+0x553/0x970 [ 84.235420] ? lock_downgrade+0x810/0x810 [ 84.239580] ? up_read+0x1a/0x110 [ 84.243037] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 84.248052] ? ima_alloc_tfm+0xcd/0xf0 [ 84.251941] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 84.257475] ? ima_calc_file_hash+0x1a3/0x970 [ 84.262078] ima_collect_measurement+0x50f/0x5c0 [ 84.266846] ? ima_get_action+0xa0/0xa0 [ 84.270837] ? integrity_iint_find+0x129/0x160 [ 84.275432] process_measurement+0xeca/0x1560 [ 84.279939] ? ima_add_template_entry.cold+0x48/0x48 [ 84.285052] ? mark_held_locks+0x100/0x100 [ 84.289300] ? dput+0x38/0x690 [ 84.292512] ? dquot_file_open+0x9b/0xb0 [ 84.296596] ? selinux_task_getsecid+0x16f/0x2d0 [ 84.301359] ? find_held_lock+0x35/0x130 [ 84.305428] ? selinux_task_getsecid+0x16f/0x2d0 [ 84.310194] ? lock_downgrade+0x810/0x810 [ 84.314354] ? kasan_check_read+0x11/0x20 [ 84.318517] ? selinux_task_getsecid+0x196/0x2d0 [ 84.323295] ima_file_check+0xc5/0x110 [ 84.327186] ? process_measurement+0x1560/0x1560 [ 84.331940] ? inode_permission+0xb4/0x560 [ 84.336199] path_openat+0x1130/0x4690 [ 84.340089] ? __lock_acquire+0x6eb/0x48f0 [ 84.344326] ? getname_flags+0xd6/0x5b0 [ 84.348298] ? getname+0x1a/0x20 [ 84.351679] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 84.356364] ? __lock_is_held+0xb6/0x140 [ 84.360444] ? find_held_lock+0x35/0x130 [ 84.364517] do_filp_open+0x1a1/0x280 [ 84.368326] ? __alloc_fd+0x44d/0x560 [ 84.372127] ? may_open_dev+0x100/0x100 [ 84.376113] ? kasan_check_read+0x11/0x20 [ 84.380263] ? do_raw_spin_unlock+0x57/0x270 [ 84.384703] do_sys_open+0x3fe/0x550 [ 84.388430] ? filp_open+0x80/0x80 [ 84.391973] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 84.396731] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 84.401484] ? do_syscall_64+0x26/0x620 [ 84.405564] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 84.410925] ? do_syscall_64+0x26/0x620 [ 84.414913] __x64_sys_openat+0x9d/0x100 [ 84.418976] do_syscall_64+0xfd/0x620 [ 84.422784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 84.427970] RIP: 0033:0x47c51a [ 84.431184] Code: e8 0b 6c fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 84.450093] RSP: 002b:000000c4221fd850 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 84.457808] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c51a [ 84.465087] RDX: 0000000000080002 RSI: 000000c4200973c0 RDI: ffffffffffffff9c [ 84.472354] RBP: 000000c4221fd8d0 R08: 0000000000000000 R09: 0000000000000000 [ 84.479634] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 84.486907] R13: 000000000000009f R14: 000000000000009e R15: 0000000000000100 [ 84.495669] Kernel Offset: disabled [ 84.499515] Rebooting in 86400 seconds..