[....] Starting OpenBSD Secure Shell server: sshd[ 31.354925] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 43.929452] random: sshd: uninitialized urandom read (32 bytes read) [ 44.261665] kauditd_printk_skb: 10 callbacks suppressed [ 44.261672] audit: type=1400 audit(1559521955.885:35): avc: denied { map } for pid=6870 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 44.311477] random: sshd: uninitialized urandom read (32 bytes read) [ 44.888591] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.172' (ECDSA) to the list of known hosts. [ 50.405757] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/03 00:32:42 fuzzer started [ 50.594495] audit: type=1400 audit(1559521962.215:36): avc: denied { map } for pid=6879 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 52.149894] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/03 00:32:44 dialing manager at 10.128.0.105:43551 2019/06/03 00:32:45 syscalls: 2441 2019/06/03 00:32:45 code coverage: enabled 2019/06/03 00:32:45 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/03 00:32:45 extra coverage: extra coverage is not supported by the kernel 2019/06/03 00:32:45 setuid sandbox: enabled 2019/06/03 00:32:45 namespace sandbox: enabled 2019/06/03 00:32:45 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/03 00:32:45 fault injection: enabled 2019/06/03 00:32:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/03 00:32:45 net packet injection: enabled 2019/06/03 00:32:45 net device setup: enabled [ 54.794054] random: crng init done 00:33:24 executing program 0: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) 00:33:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 00:33:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x14, 0x0, 0x0, 0x70bd2a}, 0x9d}}, 0x0) syz_execute_func(&(0x7f0000000080)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 00:33:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000a80)="4a2ae92c66b64c0f05bf03c00000c4a37bf0c50141e2e9c422e9babb3c0000004a0fc7a4ea70db0000451a3f0f383a9e02000000110f9ac481fc5bee5ba265aa104b26660f38d9fd3e0f380028dee5c421795aad87085c74ad047f4607c421dd589fc4e10bf8c426f2f045f61964620f38fd262e2e66450f7d64c6088f2858eff900a3bddc4c77f86262f20f7cd8c8a1a12ad364d3cf355353af6766f2ab6646d9a61b00000067ddea357d660f79ce79cec3f08340c24a6466470fec8f550000000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c4f30f2c25bd68000066450fc465000067666667f30fb8bd00000000ddcdcda2660f38346800c481c5f89780000000c4c1045ccc7d75420fa534900f5fd2f2f32828f30f5ea5a9a50000c423590d04ae00ffbedc4e61c95d45e445e47acec462759294930d00000000a2f1fbfb3b") 00:33:24 executing program 4: add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$update(0x2, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000000100)=0x7, 0x4) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffb) 00:33:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket(0x100000000a, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004050}, 0x0) syz_execute_func(&(0x7f0000000240)="b13691cd806969ef69dc00d9c4a2d1920cec14c2ab5bf9e2f9b315c7e4c653fb0fc408d73af4a95ff9c44149f2164f01c4c421fc51c12aeac4c2353e4000c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18e7df646736676666430fefb3000000000804f4f30f1a1254114d54c482d10701") [ 92.525081] audit: type=1400 audit(1559522004.145:37): avc: denied { map } for pid=6879 comm="syz-fuzzer" path="/root/syzkaller-shm422299276" dev="sda1" ino=16492 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 92.569398] audit: type=1400 audit(1559522004.145:38): avc: denied { map } for pid=6896 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=20 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 93.370183] IPVS: ftp: loaded support on port[0] = 21 [ 93.621422] NET: Registered protocol family 30 [ 93.626028] Failed to register TIPC socket type [ 94.499807] IPVS: ftp: loaded support on port[0] = 21 [ 94.531473] NET: Registered protocol family 30 [ 94.536073] Failed to register TIPC socket type [ 94.665028] chnl_net:caif_netlink_parms(): no params data found [ 94.861635] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.880147] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.913741] device bridge_slave_0 entered promiscuous mode [ 94.977787] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.059372] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.161856] device bridge_slave_1 entered promiscuous mode [ 95.513419] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 95.756002] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 96.131837] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 96.208765] team0: Port device team_slave_0 added [ 96.351124] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 96.450681] team0: Port device team_slave_1 added [ 96.572030] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 96.763774] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 97.153014] device hsr_slave_0 entered promiscuous mode [ 97.290434] device hsr_slave_1 entered promiscuous mode [ 97.364979] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 97.515678] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 97.780897] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 98.401448] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.561239] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 98.803294] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 98.809503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 98.841189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.012234] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 99.018422] 8021q: adding VLAN 0 to HW filter on device team0 [ 99.256559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 99.364876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.390637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.490302] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.496804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.632848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 99.650825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 99.658187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.751267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.811083] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.817454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.936413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 100.036030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.118735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 100.190912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.206867] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 100.350891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 100.358699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.455160] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 100.510197] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.517200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.580687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.603495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 100.660612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.668171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.757112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 100.852154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.859690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.954224] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 101.010970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.063276] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 101.221815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 101.549732] IPVS: sync thread started: state = BACKUP, mcast_ifn = erspan0, syncid = 3, id = 0 [ 101.561009] [ 101.562642] ============================================ [ 101.568076] WARNING: possible recursive locking detected [ 101.573513] 4.14.123 #17 Not tainted [ 101.577213] -------------------------------------------- [ 101.582648] ksoftirqd/1/17 is trying to acquire lock: [ 101.587822] (_xmit_ETHER#2){+.-.}, at: [] sch_direct_xmit+0x1fc/0x550 [ 101.596055] [ 101.596055] but task is already holding lock: [ 101.602015] (_xmit_ETHER#2){+.-.}, at: [] sch_direct_xmit+0x1fc/0x550 [ 101.612940] [ 101.612940] other info that might help us debug this: [ 101.619592] Possible unsafe locking scenario: [ 101.619592] [ 101.625635] CPU0 [ 101.628204] ---- [ 101.630788] lock(_xmit_ETHER#2); [ 101.634316] lock(_xmit_ETHER#2); [ 101.637851] [ 101.637851] *** DEADLOCK *** [ 101.637851] [ 101.643898] May be due to missing lock nesting notation [ 101.643898] [ 101.650816] 8 locks held by ksoftirqd/1/17: [ 101.655120] #0: (((&in_dev->mr_ifc_timer))){+.-.}, at: [] call_timer_fn+0xc8/0x670 [ 101.664573] #1: (rcu_read_lock_bh){....}, at: [] ip_finish_output2+0x256/0x14a0 [ 101.673761] #2: (rcu_read_lock_bh){....}, at: [] __dev_queue_xmit+0x1e2/0x25e0 [ 101.682865] #3: (dev->qdisc_running_key ?: &qdisc_running_key){+...}, at: [] dev_queue_xmit+0x18/0x20 [ 101.694049] #4: (_xmit_ETHER#2){+.-.}, at: [] sch_direct_xmit+0x1fc/0x550 [ 101.702723] #5: (rcu_read_lock_bh){....}, at: [] ip_finish_output2+0x256/0x14a0 [ 101.711909] #6: (rcu_read_lock_bh){....}, at: [] __dev_queue_xmit+0x1e2/0x25e0 [ 101.721010] #7: (dev->qdisc_running_key ?: &qdisc_running_key){+...}, at: [] dev_queue_xmit+0x18/0x20 [ 101.732725] [ 101.732725] stack backtrace: [ 101.737216] CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted 4.14.123 #17 [ 101.743786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.753133] Call Trace: [ 101.755717] dump_stack+0x138/0x19c [ 101.759351] __lock_acquire.cold+0x52a/0x8e2 [ 101.763754] ? trace_hardirqs_on+0x10/0x10 [ 101.767980] ? ret_from_fork+0x24/0x30 [ 101.771861] ? trace_hardirqs_on+0x10/0x10 [ 101.776088] ? skb_network_protocol+0xe0/0x450 [ 101.780666] ? dev_get_by_index_rcu+0x130/0x130 [ 101.785332] ? netif_skb_features+0x579/0xa10 [ 101.789821] ? __skb_gso_segment+0x660/0x660 [ 101.794221] ? validate_xmit_xfrm+0x34c/0x4e0 [ 101.798705] ? sch_direct_xmit+0x7e/0x550 [ 101.802845] lock_acquire+0x16f/0x430 [ 101.806635] ? sch_direct_xmit+0x1fc/0x550 [ 101.810862] _raw_spin_lock+0x2f/0x40 [ 101.814652] ? sch_direct_xmit+0x1fc/0x550 [ 101.818877] sch_direct_xmit+0x1fc/0x550 [ 101.822930] ? dev_watchdog+0x750/0x750 [ 101.826899] __dev_queue_xmit+0x1b6e/0x25e0 [ 101.831212] ? trace_hardirqs_on+0x10/0x10 [ 101.835437] ? netdev_pick_tx+0x300/0x300 [ 101.839576] ? ip_finish_output2+0x766/0x14a0 [ 101.844064] ? memcpy+0x46/0x50 [ 101.847339] dev_queue_xmit+0x18/0x20 [ 101.851132] ? dev_queue_xmit+0x18/0x20 [ 101.855097] neigh_resolve_output+0x4d8/0x870 [ 101.859586] ip_finish_output2+0x766/0x14a0 [ 101.863895] ? get_info+0x560/0x560 [ 101.867511] ? ip_output+0x3a4/0x590 [ 101.871224] ? find_held_lock+0x35/0x130 [ 101.875276] ? ip_copy_metadata+0x9b0/0x9b0 [ 101.879590] ip_finish_output+0x56d/0xc60 [ 101.883724] ? ip_finish_output+0x56d/0xc60 [ 101.888033] ip_output+0x1e6/0x590 [ 101.891563] ? ip_mc_output+0xd40/0xd40 [ 101.895531] ? ip_idents_reserve+0xf9/0x160 [ 101.899844] ? ip_fragment.constprop.0+0x200/0x200 [ 101.904765] ? __ip_select_ident+0x1a6/0x270 [ 101.909159] ip_local_out+0x97/0x170 [ 101.912878] iptunnel_xmit+0x564/0x930 [ 101.916755] ? pskb_expand_head+0x6cc/0xc10 [ 101.921070] ip_tunnel_xmit+0xfd9/0x3189 [ 101.925129] ? __ip_rt_update_pmtu+0x810/0x810 [ 101.929701] ? ip_md_tunnel_xmit+0x10e0/0x10e0 [ 101.934279] __gre_xmit+0x4eb/0x890 [ 101.937896] erspan_xmit+0x441/0x11c0 [ 101.941689] ? __gre_xmit+0x890/0x890 [ 101.945480] ? __lock_is_held+0xb6/0x140 [ 101.949533] ? check_preemption_disabled+0x3c/0x250 [ 101.954539] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 101.959980] dev_hard_start_xmit+0x18c/0x8b0 [ 101.964380] sch_direct_xmit+0x27a/0x550 [ 101.968435] ? dev_watchdog+0x750/0x750 [ 101.972399] __dev_queue_xmit+0x1b6e/0x25e0 [ 101.976713] ? trace_hardirqs_on+0x10/0x10 [ 101.980942] ? netdev_pick_tx+0x300/0x300 [ 101.985079] ? ip_finish_output2+0x766/0x14a0 [ 101.989569] ? memcpy+0x46/0x50 [ 101.992839] dev_queue_xmit+0x18/0x20 [ 101.996626] ? dev_queue_xmit+0x18/0x20 [ 102.000588] neigh_resolve_output+0x4d8/0x870 [ 102.005074] ip_finish_output2+0x766/0x14a0 [ 102.009389] ? get_info+0x560/0x560 [ 102.013010] ? ip_output+0x3a4/0x590 [ 102.016715] ? find_held_lock+0x35/0x130 [ 102.020765] ? ip_copy_metadata+0x9b0/0x9b0 [ 102.025074] ip_finish_output+0x56d/0xc60 [ 102.029212] ? ip_finish_output+0x56d/0xc60 [ 102.033704] ip_output+0x1e6/0x590 [ 102.037233] ? ip_mc_output+0xd40/0xd40 [ 102.041196] ? igmp_ifc_timer_expire+0x50a/0x8b0 [ 102.045941] ? ip_fragment.constprop.0+0x200/0x200 [ 102.050864] ip_local_out+0x97/0x170 [ 102.054570] igmpv3_sendpack+0x1a2/0x2b0 [ 102.058621] igmp_ifc_timer_expire+0x543/0x8b0 [ 102.063196] call_timer_fn+0x161/0x670 [ 102.067069] ? ip_mc_dec_group+0x430/0x430 [ 102.071308] ? __next_timer_interrupt+0x140/0x140 [ 102.076138] ? trace_hardirqs_on_caller+0x19b/0x590 [ 102.081144] run_timer_softirq+0x5b4/0x1570 [ 102.085453] ? ip_mc_dec_group+0x430/0x430 [ 102.089676] ? add_timer+0xae0/0xae0 [ 102.093379] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 102.098819] __do_softirq+0x244/0x9a0 [ 102.102613] ? tasklet_action+0x510/0x510 [ 102.106748] run_ksoftirqd+0x8c/0x1b0 [ 102.110538] smpboot_thread_fn+0x5f4/0x960 [ 102.114766] ? __kthread_parkme+0x117/0x1c0 [ 102.119077] ? sort_range+0x30/0x30 [ 102.122700] kthread+0x319/0x430 [ 102.126053] ? sort_range+0x30/0x30 [ 102.129677] ? kthread_create_on_node+0xd0/0xd0 [ 102.134336] ret_from_fork+0x24/0x30 00:33:33 executing program 0: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c08fe978e125001000020f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) [ 102.152989] kobject: 'loop0' (ffff8880a49377a0): kobject_uevent_env [ 102.160628] kobject: 'loop0' (ffff8880a49377a0): fill_kobj_path: path = '/devices/virtual/block/loop0' 00:33:34 executing program 0: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) [ 102.725896] kobject: 'loop0' (ffff8880a49377a0): kobject_uevent_env [ 102.733212] kobject: 'loop0' (ffff8880a49377a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 103.020140] IPVS: ftp: loaded support on port[0] = 21 [ 103.151834] NET: Registered protocol family 30 [ 103.156419] Failed to register TIPC socket type 00:33:34 executing program 0: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) [ 103.205018] kobject: 'loop0' (ffff8880a49377a0): kobject_uevent_env [ 103.220264] kobject: 'loop0' (ffff8880a49377a0): fill_kobj_path: path = '/devices/virtual/block/loop0' 00:33:35 executing program 0: socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000540)="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") sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 00:33:35 executing program 0: socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000540)="994a2ae92c02b64c0f05bf03000000c4a37bf0c50641e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000d0d383a9e02000000110f4e5b6666a265aa104b26660f38091e410f115d28a2631bc4215c045f460707c48d3c21b35c9fbdd4e11bf9d4e11bf96f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ffd70065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f47dbe1660f79cec462b1f72ec3c4899294d800000000000f65f3440fe6cd00823d4e3d4e0b00c4026db9d6cc7a0ec8c442cf376d000f9fc442610b2336b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83af6a2f1f0448011fcfb766208cf") sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 103.818910] kobject: 'loop0' (ffff8880a49377a0): kobject_uevent_env [ 103.827025] kobject: 'loop0' (ffff8880a49377a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 103.880553] kobject: 'loop0' (ffff8880a49377a0): kobject_uevent_env [ 103.886976] kobject: 'loop0' (ffff8880a49377a0): fill_kobj_path: path = '/devices/virtual/block/loop0' 00:33:35 executing program 0: socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000540)="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") sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 103.971334] kobject: 'loop0' (ffff8880a49377a0): kobject_uevent_env [ 103.977788] kobject: 'loop0' (ffff8880a49377a0): fill_kobj_path: path = '/devices/virtual/block/loop0' 00:33:35 executing program 0: socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000540)="994a2ae92c02b64c0f05bf03000000c4a37bf0c50641e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000d0d383a9e02000000110f4e5b6666a265aa104b26660f38091e410f115d28a2631bc4215c045f460707c48d3c21b35c9fbdd4e11bf9d4e11bf96f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ffd70065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f47dbe1660f79cec462b1f72ec3c4899294d800000000000f65f3440fe6cd00823d4e3d4e0b00c4026db9d6cc7a0ec8c442cf376d000f9fc442610b2336b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83af6a2f1f0448011fcfb766208cf") sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 104.052567] kobject: 'loop0' (ffff8880a49377a0): kobject_uevent_env [ 104.059017] kobject: 'loop0' (ffff8880a49377a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 104.120546] kobject: 'loop0' (ffff8880a49377a0): kobject_uevent_env [ 104.126979] kobject: 'loop0' (ffff8880a49377a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 104.510181] IPVS: ftp: loaded support on port[0] = 21 [ 104.770902] NET: Registered protocol family 30 [ 104.775491] Failed to register TIPC socket type [ 106.180169] IPVS: ftp: loaded support on port[0] = 21 [ 106.471044] NET: Registered protocol family 30 [ 106.475634] Failed to register TIPC socket type [ 107.800204] IPVS: ftp: loaded support on port[0] = 21 [ 108.041078] NET: Registered protocol family 30 [ 108.045678] Failed to register TIPC socket type [ 109.390364] IPVS: ftp: loaded support on port[0] = 21 [ 109.761164] NET: Registered protocol family 30 [ 109.765751] Failed to register TIPC socket type [ 111.190176] IPVS: ftp: loaded support on port[0] = 21 [ 111.451045] NET: Registered protocol family 30 [ 111.455640] Failed to register TIPC socket type