BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:424/tfrc_rx_hist_sample_rtt() audit: type=1400 audit(1578754423.260:4335): avc: denied { name_connect } for pid=16593 comm="syz-executor.5" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 CPU: 0 PID: 16609 Comm: syz-executor.5 Not tainted 4.14.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 tfrc_rx_hist_sample_rtt.cold+0x59/0x6b net/dccp/ccids/lib/packet_history.c:424 ccid3_hc_rx_packet_recv+0x501/0xda0 net/dccp/ccids/ccid3.c:766 ccid_hc_rx_packet_recv net/dccp/ccid.h:185 [inline] dccp_deliver_input_to_ccids+0xdd/0x250 net/dccp/input.c:180 dccp_rcv_established net/dccp/input.c:378 [inline] dccp_rcv_established+0x6b/0xb0 net/dccp/input.c:368 dccp_v4_do_rcv+0x122/0x170 net/dccp/ipv4.c:656 sk_backlog_rcv include/net/sock.h:917 [inline] __release_sock+0x12d/0x350 net/core/sock.c:2264 release_sock+0x59/0x1b0 net/core/sock.c:2779 dccp_sendmsg+0x57e/0x950 net/dccp/proto.c:813 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x349/0x840 net/socket.c:2062 __sys_sendmmsg+0x152/0x3a0 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2178 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45af49 RSP: 002b:00007f4657e4cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045af49 RDX: 00000000000003a6 RSI: 0000000020005700 RDI: 0000000000000005 RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4657e4d6d4 R13: 00000000004c9b0f R14: 00000000004e2af8 R15: 00000000ffffffff bond1 (uninitialized): Released all slaves dccp_close: ABORT with 1061 bytes unread bond1 (uninitialized): Released all slaves dccp_close: ABORT with 9446 bytes unread nbd_handle_cmd: 82 callbacks suppressed block nbd1: Attempted send on invalid socket print_req_error: 82 callbacks suppressed print_req_error: I/O error, dev nbd1, sector 0 f2fs_msg: 82 callbacks suppressed F2FS-fs (nbd1): Unable to read 1th superblock block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 8 F2FS-fs (nbd1): Unable to read 2th superblock block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 0 F2FS-fs (nbd1): Unable to read 1th superblock block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 8 F2FS-fs (nbd1): Unable to read 2th superblock FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 0 F2FS-fs (nbd1): Unable to read 1th superblock CPU: 1 PID: 16746 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x287/0x780 mm/slab.c:3640 __alloc_skb+0x9c/0x500 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:980 [inline] alloc_skb_with_frags+0x86/0x4b0 net/core/skbuff.c:5228 sock_alloc_send_pskb+0x5db/0x740 net/core/sock.c:2078 sock_alloc_send_skb+0x32/0x40 net/core/sock.c:2095 __ip_append_data.isra.0+0x1227/0x20f0 net/ipv4/ip_output.c:972 ip_make_skb+0x17a/0x1d0 net/ipv4/ip_output.c:1489 udp_sendmsg+0x16a6/0x1da0 net/ipv4/udp.c:1052 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x349/0x840 net/socket.c:2062 __sys_sendmmsg+0x152/0x3a0 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2178 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 block nbd1: Attempted send on invalid socket RIP: 0033:0x45af49 RSP: 002b:00007f0af0cf2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f0af0cf2c90 RCX: 000000000045af49 RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0af0cf36d4 R13: 00000000004c9b0f R14: 00000000004e2af8 R15: 0000000000000007 print_req_error: I/O error, dev nbd1, sector 8 F2FS-fs (nbd1): Unable to read 2th superblock block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 0 F2FS-fs (nbd1): Unable to read 1th superblock block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 8 F2FS-fs (nbd1): Unable to read 2th superblock dccp_close: ABORT with 9446 bytes unread FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 16782 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x280/0x770 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3696 __kmalloc_reserve.isra.0+0x40/0xe0 net/core/skbuff.c:137 __alloc_skb+0xcf/0x500 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:980 [inline] alloc_skb_with_frags+0x86/0x4b0 net/core/skbuff.c:5228 sock_alloc_send_pskb+0x5db/0x740 net/core/sock.c:2078 sock_alloc_send_skb+0x32/0x40 net/core/sock.c:2095 __ip_append_data.isra.0+0x1227/0x20f0 net/ipv4/ip_output.c:972 ip_make_skb+0x17a/0x1d0 net/ipv4/ip_output.c:1489 udp_sendmsg+0x16a6/0x1da0 net/ipv4/udp.c:1052 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x349/0x840 net/socket.c:2062 __sys_sendmmsg+0x152/0x3a0 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2178 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45af49 RSP: 002b:00007f0af0cf2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f0af0cf2c90 RCX: 000000000045af49 RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0af0cf36d4 R13: 00000000004c9b0f R14: 00000000004e2af8 R15: 0000000000000007 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 16808 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x47/0x780 mm/slab.c:3550 skb_clone+0x129/0x320 net/core/skbuff.c:1282 ip_mc_output+0x628/0xd40 net/ipv4/ip_output.c:383 dst_output include/net/dst.h:462 [inline] ip_local_out+0x97/0x170 net/ipv4/ip_output.c:124 ip_send_skb+0x3e/0xc0 net/ipv4/ip_output.c:1422 udp_send_skb+0x53f/0xb90 net/ipv4/udp.c:833 udp_sendmsg+0x16df/0x1da0 net/ipv4/udp.c:1057 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x349/0x840 net/socket.c:2062 __sys_sendmmsg+0x152/0x3a0 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2178 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45af49 RSP: 002b:00007f0af0cf2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f0af0cf2c90 RCX: 000000000045af49 RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0af0cf36d4 R13: 00000000004c9b0f R14: 00000000004e2af8 R15: 0000000000000007 block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 0 F2FS-fs (nbd1): Unable to read 1th superblock block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 8 F2FS-fs (nbd1): Unable to read 2th superblock FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 16843 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x47/0x780 mm/slab.c:3550 skb_clone+0x129/0x320 net/core/skbuff.c:1282 dev_queue_xmit_nit+0x2da/0x940 net/core/dev.c:1943 xmit_one net/core/dev.c:3005 [inline] dev_hard_start_xmit+0xa7/0x8b0 net/core/dev.c:3025 sch_direct_xmit+0x27a/0x550 net/sched/sch_generic.c:186 __dev_xmit_skb net/core/dev.c:3218 [inline] __dev_queue_xmit+0x1b6e/0x25e0 net/core/dev.c:3493 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 dev_queue_xmit+0x18/0x20 net/core/dev.c:3558 neigh_hh_output include/net/neighbour.h:490 [inline] neigh_output include/net/neighbour.h:498 [inline] ip_finish_output2+0xde8/0x14a0 net/ipv4/ip_output.c:229 ip_finish_output+0x56d/0xc60 net/ipv4/ip_output.c:317 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip_mc_output+0x24a/0xd40 net/ipv4/ip_output.c:390 dst_output include/net/dst.h:462 [inline] ip_local_out+0x97/0x170 net/ipv4/ip_output.c:124 ip_send_skb+0x3e/0xc0 net/ipv4/ip_output.c:1422 udp_send_skb+0x53f/0xb90 net/ipv4/udp.c:833 udp_sendmsg+0x16df/0x1da0 net/ipv4/udp.c:1057 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x349/0x840 net/socket.c:2062 __sys_sendmmsg+0x152/0x3a0 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2178 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45af49 RSP: 002b:00007f0af0cf2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f0af0cf2c90 RCX: 000000000045af49 RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0af0cf36d4 R13: 00000000004c9b0f R14: 00000000004e2af8 R15: 0000000000000007 protocol 88fb is buggy, dev hsr_slave_0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 16881 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x47/0x780 mm/slab.c:3550 skb_clone+0x129/0x320 net/core/skbuff.c:1282 packet_rcv+0x304/0x1330 net/packet/af_packet.c:2118 packet_rcv_fanout+0x472/0x5d0 net/packet/af_packet.c:1498 deliver_skb net/core/dev.c:1881 [inline] dev_queue_xmit_nit+0x1f8/0x940 net/core/dev.c:1937 xmit_one net/core/dev.c:3005 [inline] dev_hard_start_xmit+0xa7/0x8b0 net/core/dev.c:3025 sch_direct_xmit+0x27a/0x550 net/sched/sch_generic.c:186 __dev_xmit_skb net/core/dev.c:3218 [inline] __dev_queue_xmit+0x1b6e/0x25e0 net/core/dev.c:3493 dev_queue_xmit+0x18/0x20 net/core/dev.c:3558 neigh_hh_output include/net/neighbour.h:490 [inline] neigh_output include/net/neighbour.h:498 [inline] ip_finish_output2+0xde8/0x14a0 net/ipv4/ip_output.c:229 ip_finish_output+0x56d/0xc60 net/ipv4/ip_output.c:317 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip_mc_output+0x24a/0xd40 net/ipv4/ip_output.c:390 dst_output include/net/dst.h:462 [inline] ip_local_out+0x97/0x170 net/ipv4/ip_output.c:124 ip_send_skb+0x3e/0xc0 net/ipv4/ip_output.c:1422 udp_send_skb+0x53f/0xb90 net/ipv4/udp.c:833 udp_sendmsg+0x16df/0x1da0 net/ipv4/udp.c:1057 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x349/0x840 net/socket.c:2062 __sys_sendmmsg+0x152/0x3a0 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2178 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45af49 RSP: 002b:00007f0af0cf2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f0af0cf2c90 RCX: 000000000045af49 RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0af0cf36d4 R13: 00000000004c9b0f R14: 00000000004e2af8 R15: 0000000000000007 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 16917 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x280/0x770 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3696 __kmalloc_reserve.isra.0+0x40/0xe0 net/core/skbuff.c:137 __alloc_skb+0xcf/0x500 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:980 [inline] alloc_skb_with_frags+0x86/0x4b0 net/core/skbuff.c:5228 sock_alloc_send_pskb+0x5db/0x740 net/core/sock.c:2078 sock_alloc_send_skb+0x32/0x40 net/core/sock.c:2095 __ip_append_data.isra.0+0x1227/0x20f0 net/ipv4/ip_output.c:972 ip_make_skb+0x17a/0x1d0 net/ipv4/ip_output.c:1489 udp_sendmsg+0x16a6/0x1da0 net/ipv4/udp.c:1052 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x349/0x840 net/socket.c:2062 __sys_sendmmsg+0x152/0x3a0 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2178 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45af49 RSP: 002b:00007f0af0cf2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f0af0cf2c90 RCX: 000000000045af49 RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0af0cf36d4 R13: 00000000004c9b0f R14: 00000000004e2af8 R15: 0000000000000007 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 overlayfs: missing 'workdir' CPU: 1 PID: 16939 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x47/0x780 mm/slab.c:3550 skb_clone+0x129/0x320 net/core/skbuff.c:1282 batman_adv: Cannot find parent device ip_mc_output+0x628/0xd40 net/ipv4/ip_output.c:383 dst_output include/net/dst.h:462 [inline] ip_local_out+0x97/0x170 net/ipv4/ip_output.c:124 ip_send_skb+0x3e/0xc0 net/ipv4/ip_output.c:1422 udp_send_skb+0x53f/0xb90 net/ipv4/udp.c:833 udp_sendmsg+0x16df/0x1da0 net/ipv4/udp.c:1057 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x349/0x840 net/socket.c:2062 __sys_sendmmsg+0x152/0x3a0 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2178 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45af49 RSP: 002b:00007f0af0cf2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f0af0cf2c90 RCX: 000000000045af49 RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0af0cf36d4 R13: 00000000004c9b0f R14: 00000000004e2af8 R15: 0000000000000007 batman_adv: Cannot find parent device nbd_handle_cmd: 58 callbacks suppressed block nbd0: Attempted send on invalid socket print_req_error: 58 callbacks suppressed print_req_error: I/O error, dev nbd0, sector 0 f2fs_msg: 58 callbacks suppressed F2FS-fs (nbd0): Unable to read 1th superblock block nbd0: Attempted send on invalid socket print_req_error: I/O error, dev nbd0, sector 8 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 F2FS-fs (nbd0): Unable to read 2th superblock CPU: 0 PID: 16987 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 block nbd0: Attempted send on invalid socket should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x47/0x780 mm/slab.c:3550 skb_clone+0x129/0x320 net/core/skbuff.c:1282 dev_queue_xmit_nit+0x2da/0x940 net/core/dev.c:1943 print_req_error: I/O error, dev nbd0, sector 0 xmit_one net/core/dev.c:3005 [inline] dev_hard_start_xmit+0xa7/0x8b0 net/core/dev.c:3025 F2FS-fs (nbd0): Unable to read 1th superblock sch_direct_xmit+0x27a/0x550 net/sched/sch_generic.c:186 __dev_xmit_skb net/core/dev.c:3218 [inline] __dev_queue_xmit+0x1b6e/0x25e0 net/core/dev.c:3493 block nbd0: Attempted send on invalid socket dev_queue_xmit+0x18/0x20 net/core/dev.c:3558 neigh_hh_output include/net/neighbour.h:490 [inline] neigh_output include/net/neighbour.h:498 [inline] ip_finish_output2+0xde8/0x14a0 net/ipv4/ip_output.c:229 print_req_error: I/O error, dev nbd0, sector 8 ip_finish_output+0x56d/0xc60 net/ipv4/ip_output.c:317 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip_mc_output+0x24a/0xd40 net/ipv4/ip_output.c:390 F2FS-fs (nbd0): Unable to read 2th superblock dst_output include/net/dst.h:462 [inline] ip_local_out+0x97/0x170 net/ipv4/ip_output.c:124 ip_send_skb+0x3e/0xc0 net/ipv4/ip_output.c:1422 udp_send_skb+0x53f/0xb90 net/ipv4/udp.c:833 udp_sendmsg+0x16df/0x1da0 net/ipv4/udp.c:1057 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x349/0x840 net/socket.c:2062 __sys_sendmmsg+0x152/0x3a0 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2178 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45af49 RSP: 002b:00007f0af0cf2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f0af0cf2c90 RCX: 000000000045af49 RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0af0cf36d4 R13: 00000000004c9b0f R14: 00000000004e2af8 R15: 0000000000000007 netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 0 F2FS-fs (nbd1): Unable to read 1th superblock block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 8 F2FS-fs (nbd1): Unable to read 2th superblock block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 0 F2FS-fs (nbd1): Unable to read 1th superblock block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 8 F2FS-fs (nbd1): Unable to read 2th superblock block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 0 F2FS-fs (nbd1): Unable to read 1th superblock netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. block nbd1: Attempted send on invalid socket print_req_error: I/O error, dev nbd1, sector 8 F2FS-fs (nbd1): Unable to read 2th superblock FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 17024 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x287/0x780 mm/slab.c:3640 __alloc_skb+0x9c/0x500 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:980 [inline] alloc_skb_with_frags+0x86/0x4b0 net/core/skbuff.c:5228 sock_alloc_send_pskb+0x5db/0x740 net/core/sock.c:2078 sock_alloc_send_skb+0x32/0x40 net/core/sock.c:2095 __ip_append_data.isra.0+0x1227/0x20f0 net/ipv4/ip_output.c:972 ip_make_skb+0x17a/0x1d0 net/ipv4/ip_output.c:1489 udp_sendmsg+0x16a6/0x1da0 net/ipv4/udp.c:1052 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x349/0x840 net/socket.c:2062 __sys_sendmmsg+0x152/0x3a0 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2178 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45af49 RSP: 002b:00007f0af0cf2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f0af0cf2c90 RCX: 000000000045af49 RDX: 04000000000001a8 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0af0cf36d4 R13: 00000000004c9b0f R14: 00000000004e2af8 R15: 0000000000000007 net_ratelimit: 23 callbacks suppressed protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_1 netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. audit: type=1400 audit(1578754431.900:4336): avc: denied { map } for pid=17054 comm="syz-executor.5" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=85679 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. audit: type=1800 audit(1578754432.170:4337): pid=17080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=17235 res=0 audit: type=1804 audit(1578754432.200:4338): pid=17080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir833292619/syzkaller.kVdqKd/227/file0" dev="sda1" ino=17235 res=1 hugetlbfs: syz-executor.2 (17128): Using mlock ulimits for SHM_HUGETLB is deprecated