Warning: Permanently added '10.128.10.55' (ECDSA) to the list of known hosts. 2018/12/30 09:02:55 fuzzer started 2018/12/30 09:03:00 dialing manager at 10.128.0.26:41469 2018/12/30 09:03:00 syscalls: 1 2018/12/30 09:03:00 code coverage: enabled 2018/12/30 09:03:00 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/30 09:03:00 setuid sandbox: enabled 2018/12/30 09:03:00 namespace sandbox: enabled 2018/12/30 09:03:00 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/30 09:03:00 fault injection: enabled 2018/12/30 09:03:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/30 09:03:00 net packet injection: enabled 2018/12/30 09:03:00 net device setup: enabled 09:03:03 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="44ff03001400080025bd7000ffdbdb250a0010003c026c0019e7775ab07bb4085b4e17d1a8841e0500000000000000b01cff6a14ff7e5351"], 0x1}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) syzkaller login: [ 117.645858] IPVS: ftp: loaded support on port[0] = 21 [ 117.801203] chnl_net:caif_netlink_parms(): no params data found [ 117.872943] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.879515] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.888139] device bridge_slave_0 entered promiscuous mode [ 117.897924] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.904587] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.913093] device bridge_slave_1 entered promiscuous mode [ 117.947658] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 117.959827] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 117.990024] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 117.998825] team0: Port device team_slave_0 added [ 118.005971] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 118.015289] team0: Port device team_slave_1 added [ 118.021713] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 118.030478] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 118.266882] device hsr_slave_0 entered promiscuous mode [ 118.392767] device hsr_slave_1 entered promiscuous mode [ 118.542954] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 118.550652] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 118.580970] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.587613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.594902] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.601455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.688772] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 118.694979] 8021q: adding VLAN 0 to HW filter on device bond0 [ 118.710143] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 118.723889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.735083] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.745485] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.756245] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 118.775622] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 118.781925] 8021q: adding VLAN 0 to HW filter on device team0 [ 118.797621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 118.804906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.815090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.823617] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.830114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.845975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 118.859058] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 118.868384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.877450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.886132] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.892801] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.901898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 118.927784] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 118.935280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 118.955155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 118.962303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 118.972307] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 118.982443] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 118.995733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 119.004045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 119.013442] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 119.028805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 119.036995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 119.045794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 119.060415] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 119.068485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 119.076952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 119.097429] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 119.103649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 119.131178] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 119.154829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 119.221777] ================================================================== [ 119.229220] BUG: KMSAN: uninit-value in send_hsr_supervision_frame+0x1056/0x1510 [ 119.236790] CPU: 0 PID: 11413 Comm: syz-fuzzer Not tainted 4.20.0-rc7+ #16 [ 119.243824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.253204] Call Trace: [ 119.255811] [ 119.257996] dump_stack+0x173/0x1d0 [ 119.261678] kmsan_report+0x12e/0x2a0 [ 119.265518] __msan_warning+0x82/0xf0 [ 119.269380] send_hsr_supervision_frame+0x1056/0x1510 [ 119.274646] hsr_announce+0x14c/0x3a0 [ 119.278501] call_timer_fn+0x285/0x600 [ 119.282425] ? hsr_dev_finalize+0xb90/0xb90 [ 119.286785] __run_timers+0xdb4/0x11d0 [ 119.290705] ? hsr_dev_finalize+0xb90/0xb90 [ 119.295087] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 119.300570] ? irqtime_account_irq+0xcf/0x2e0 [ 119.305104] ? timers_dead_cpu+0xa50/0xa50 [ 119.309402] run_timer_softirq+0x2e/0x50 [ 119.313513] __do_softirq+0x53f/0x93a [ 119.317399] irq_exit+0x214/0x250 [ 119.320890] exiting_irq+0xe/0x10 [ 119.324397] smp_apic_timer_interrupt+0x48/0x70 [ 119.329095] apic_timer_interrupt+0x2e/0x40 [ 119.333445] [ 119.335716] RIP: 0010:sha256_generic_block_fn+0x2188/0xab60 [ 119.341454] Code: 34 02 00 00 e8 c9 78 c6 fd 48 89 44 24 48 8b 84 24 c8 00 00 00 89 c7 89 c1 85 db 75 06 8b 0a 8b 7c 24 14 89 8c 24 d8 00 00 00 <45> 85 ff 44 8b 8c 24 b8 00 00 00 41 0f 44 f9 44 8b 2c 24 45 85 ed [ 119.360405] RSP: 0018:ffff888073ebed40 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 119.368152] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 119.375459] RDX: ffff888073f8ef74 RSI: 0000160000000000 RDI: 0000000000000000 [ 119.382760] RBP: ffff888073ebf078 R08: 0000000000000000 R09: 00000000f02000a6 [ 119.390059] R10: 000000008537a31f R11: 0000000000000000 R12: 0000000075d24422 [ 119.397413] R13: 0000000000000000 R14: 00000000c1d4a4cf R15: 0000000000000000 [ 119.404882] crypto_sha256_update+0x35f/0x3b0 [ 119.409442] ? sha1_base_init+0x180/0x180 [ 119.413620] crypto_shash_update+0x484/0x4f0 [ 119.418086] ? integrity_kernel_read+0x221/0x280 09:03:05 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="44ff03001400080025bd7000ffdbdb250a0010003c026c0019e7775ab07bb4085b4e17d1a8841e0500000000000000b01cff6a14ff7e5351"], 0x1}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 09:03:05 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="44ff03001400080025bd7000ffdbdb250a0010003c026c0019e7775ab07bb4085b4e17d1a8841e0500000000000000b01cff6a14ff7e5351"], 0x1}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 119.422889] ima_calc_file_hash+0x25ca/0x2ca0 [ 119.427437] ? ext4_xattr_ibody_get+0x1a0/0x1290 [ 119.432260] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 119.437673] ? ext4_xattr_get+0xcd0/0xff0 [ 119.441889] ? __msan_poison_alloca+0x1f0/0x2a0 [ 119.446610] ima_collect_measurement+0x48d/0x980 [ 119.451463] process_measurement+0x1b37/0x2740 [ 119.456133] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 119.461533] ? refcount_dec_and_test_checked+0x1e8/0x2c0 [ 119.467036] ? apparmor_task_getsecid+0x172/0x190 09:03:05 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="44ff03001400080025bd7000ffdbdb250a0010003c026c0019e7775ab07bb4085b4e17d1a8841e0500000000000000b01cff6a14ff7e5351"], 0x1}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 119.471924] ? apparmor_task_alloc+0x300/0x300 [ 119.476545] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 119.481948] ? security_task_getsecid+0x17f/0x190 [ 119.486842] ima_file_check+0x131/0x170 [ 119.490864] path_openat+0x4af5/0x6b90 [ 119.494829] ? expand_files+0x5d/0xcf0 [ 119.498868] ? do_sys_open+0x640/0x960 [ 119.502793] do_filp_open+0x2b8/0x710 [ 119.506671] do_sys_open+0x640/0x960 [ 119.510441] __se_sys_openat+0xcb/0xe0 [ 119.514396] __x64_sys_openat+0x56/0x70 [ 119.518425] do_syscall_64+0xbc/0xf0 [ 119.522177] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 119.527408] RIP: 0033:0x47fcba [ 119.530626] Code: e8 2b 41 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 119.549557] RSP: 002b:000000c4202857e8 EFLAGS: 00000212 ORIG_RAX: 0000000000000101 [ 119.557297] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047fcba [ 119.564602] RDX: 0000000000080002 RSI: 000000c420094ca0 RDI: ffffffffffffff9c [ 119.571901] RBP: 000000c420285868 R08: 0000000000000000 R09: 0000000000000000 [ 119.579194] R10: 00000000000001a4 R11: 0000000000000212 R12: 0000000000000000 [ 119.586497] R13: 00000000000000f5 R14: 0000000000000075 R15: 0000000000000004 [ 119.593814] [ 119.595462] Uninit was created at: [ 119.599042] kmsan_save_stack_with_flags+0x7a/0x130 [ 119.604088] kmsan_internal_alloc_meta_for_pages+0x113/0x580 [ 119.609916] kmsan_alloc_page+0x7e/0x100 [ 119.614007] __alloc_pages_nodemask+0x1587/0x5f20 [ 119.618880] page_frag_alloc+0x3c1/0x980 09:03:05 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="44ff03001400080025bd7000ffdbdb250a0010003c026c0019e7775ab07bb4085b4e17d1a8841e0500000000000000b01cff6a14ff7e5351"], 0x1}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 119.622970] __netdev_alloc_skb+0x1f1/0xa50 [ 119.627322] send_hsr_supervision_frame+0x168/0x1510 [ 119.632477] hsr_announce+0x14c/0x3a0 [ 119.636302] call_timer_fn+0x285/0x600 [ 119.640215] __run_timers+0xdb4/0x11d0 [ 119.644131] run_timer_softirq+0x2e/0x50 [ 119.648224] __do_softirq+0x53f/0x93a [ 119.652039] ================================================================== [ 119.659415] Disabling lock debugging due to kernel taint [ 119.664883] Kernel panic - not syncing: panic_on_warn set ... 09:03:05 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="44ff03001400080025bd7000ffdbdb250a0010003c026c0019e7775ab07bb4085b4e17d1a8841e0500000000000000b01cff6a14ff7e5351"], 0x1}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 119.670903] CPU: 0 PID: 11413 Comm: syz-fuzzer Tainted: G B 4.20.0-rc7+ #16 [ 119.679322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.688718] Call Trace: [ 119.691321] [ 119.693542] dump_stack+0x173/0x1d0 [ 119.697216] panic+0x3ce/0x961 [ 119.700495] kmsan_report+0x293/0x2a0 [ 119.704336] __msan_warning+0x82/0xf0 [ 119.708209] send_hsr_supervision_frame+0x1056/0x1510 [ 119.713486] hsr_announce+0x14c/0x3a0 [ 119.717348] call_timer_fn+0x285/0x600 [ 119.721293] ? hsr_dev_finalize+0xb90/0xb90 [ 119.725654] __run_timers+0xdb4/0x11d0 [ 119.729577] ? hsr_dev_finalize+0xb90/0xb90 [ 119.733954] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 119.739440] ? irqtime_account_irq+0xcf/0x2e0 [ 119.743975] ? timers_dead_cpu+0xa50/0xa50 [ 119.748240] run_timer_softirq+0x2e/0x50 [ 119.752331] __do_softirq+0x53f/0x93a [ 119.756211] irq_exit+0x214/0x250 [ 119.759695] exiting_irq+0xe/0x10 [ 119.763183] smp_apic_timer_interrupt+0x48/0x70 [ 119.767881] apic_timer_interrupt+0x2e/0x40 [ 119.772220] 09:03:05 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="44ff03001400080025bd7000ffdbdb250a0010003c026c0019e7775ab07bb4085b4e17d1a8841e0500000000000000b01cff6a14ff7e5351"], 0x1}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 119.774490] RIP: 0010:sha256_generic_block_fn+0x2188/0xab60 [ 119.780231] Code: 34 02 00 00 e8 c9 78 c6 fd 48 89 44 24 48 8b 84 24 c8 00 00 00 89 c7 89 c1 85 db 75 06 8b 0a 8b 7c 24 14 89 8c 24 d8 00 00 00 <45> 85 ff 44 8b 8c 24 b8 00 00 00 41 0f 44 f9 44 8b 2c 24 45 85 ed [ 119.799170] RSP: 0018:ffff888073ebed40 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 119.806962] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 119.814264] RDX: ffff888073f8ef74 RSI: 0000160000000000 RDI: 0000000000000000 09:03:05 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="44ff03001400080025bd7000ffdbdb250a0010003c026c0019e7775ab07bb4085b4e17d1a8841e0500000000000000b01cff6a14ff7e5351"], 0x1}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 119.821563] RBP: ffff888073ebf078 R08: 0000000000000000 R09: 00000000f02000a6 [ 119.828856] R10: 000000008537a31f R11: 0000000000000000 R12: 0000000075d24422 [ 119.836146] R13: 0000000000000000 R14: 00000000c1d4a4cf R15: 0000000000000000 [ 119.843608] crypto_sha256_update+0x35f/0x3b0 [ 119.848161] ? sha1_base_init+0x180/0x180 [ 119.852338] crypto_shash_update+0x484/0x4f0 [ 119.856834] ? integrity_kernel_read+0x221/0x280 [ 119.861649] ima_calc_file_hash+0x25ca/0x2ca0 [ 119.866198] ? ext4_xattr_ibody_get+0x1a0/0x1290 [ 119.871027] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 119.876445] ? ext4_xattr_get+0xcd0/0xff0 [ 119.880664] ? __msan_poison_alloca+0x1f0/0x2a0 [ 119.885416] ima_collect_measurement+0x48d/0x980 [ 119.890250] process_measurement+0x1b37/0x2740 [ 119.894933] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 119.900329] ? refcount_dec_and_test_checked+0x1e8/0x2c0 [ 119.905853] ? apparmor_task_getsecid+0x172/0x190 [ 119.910732] ? apparmor_task_alloc+0x300/0x300 [ 119.915377] ? __msan_metadata_ptr_for_load_8+0x10/0x20 09:03:06 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="44ff03001400080025bd7000ffdbdb250a0010003c026c0019e7775ab07bb4085b4e17d1a8841e0500000000000000b01cff6a14ff7e5351"], 0x1}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 119.920864] ? security_task_getsecid+0x17f/0x190 [ 119.925751] ima_file_check+0x131/0x170 [ 119.929771] path_openat+0x4af5/0x6b90 [ 119.933732] ? expand_files+0x5d/0xcf0 [ 119.937674] ? do_sys_open+0x640/0x960 [ 119.941605] do_filp_open+0x2b8/0x710 [ 119.945531] do_sys_open+0x640/0x960 [ 119.949303] __se_sys_openat+0xcb/0xe0 [ 119.953242] __x64_sys_openat+0x56/0x70 [ 119.957247] do_syscall_64+0xbc/0xf0 [ 119.961006] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 119.966225] RIP: 0033:0x47fcba 09:03:06 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="44ff03001400080025bd7000ffdbdb250a0010003c026c0019e7775ab07bb4085b4e17d1a8841e0500000000000000b01cff6a14ff7e5351"], 0x1}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 119.969441] Code: e8 2b 41 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 119.988390] RSP: 002b:000000c4202857e8 EFLAGS: 00000212 ORIG_RAX: 0000000000000101 [ 119.996134] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047fcba [ 120.003465] RDX: 0000000000080002 RSI: 000000c420094ca0 RDI: ffffffffffffff9c [ 120.010759] RBP: 000000c420285868 R08: 0000000000000000 R09: 0000000000000000 [ 120.018544] R10: 00000000000001a4 R11: 0000000000000212 R12: 0000000000000000 [ 120.025839] R13: 00000000000000f5 R14: 0000000000000075 R15: 0000000000000004 [ 120.034162] Kernel Offset: disabled [ 120.037803] Rebooting in 86400 seconds..