Warning: Permanently added '10.128.10.63' (ECDSA) to the list of known hosts. 2019/06/03 01:52:04 fuzzer started [ 52.404494] audit: type=1400 audit(1559526724.945:36): avc: denied { map } for pid=7774 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/03 01:52:07 dialing manager at 10.128.0.105:38455 2019/06/03 01:52:08 syscalls: 2457 2019/06/03 01:52:08 code coverage: enabled 2019/06/03 01:52:08 comparison tracing: enabled 2019/06/03 01:52:08 extra coverage: extra coverage is not supported by the kernel 2019/06/03 01:52:08 setuid sandbox: enabled 2019/06/03 01:52:08 namespace sandbox: enabled 2019/06/03 01:52:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/03 01:52:08 fault injection: enabled 2019/06/03 01:52:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/03 01:52:08 net packet injection: enabled 2019/06/03 01:52:08 net device setup: enabled 01:52:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r1, r2, 0x0, 0x8000) [ 80.824912] audit: type=1400 audit(1559526753.365:37): avc: denied { map } for pid=7792 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14995 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 80.912409] IPVS: ftp: loaded support on port[0] = 21 [ 80.922047] NET: Registered protocol family 30 [ 80.926902] Failed to register TIPC socket type 01:52:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x14, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x28}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 01:52:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1fa}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 81.217710] IPVS: ftp: loaded support on port[0] = 21 [ 81.257649] NET: Registered protocol family 30 [ 81.262293] Failed to register TIPC socket type [ 81.439942] IPVS: ftp: loaded support on port[0] = 21 [ 81.468742] NET: Registered protocol family 30 [ 81.473387] Failed to register TIPC socket type 01:52:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$CAPI_NCCI_GETUNIT(0xffffffffffffffff, 0x80044327, 0x0) syz_execute_func(&(0x7f00000002c0)="b1ee91cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2160f01c4c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") syz_execute_func(&(0x7f00000005c0)="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") ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) [ 81.967745] IPVS: ftp: loaded support on port[0] = 21 [ 81.987250] NET: Registered protocol family 30 [ 81.991884] Failed to register TIPC socket type 01:52:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x1, 0x1}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) [ 83.395184] chnl_net:caif_netlink_parms(): no params data found [ 83.720720] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.785945] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.843173] device bridge_slave_0 entered promiscuous mode [ 83.878256] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.882219] IPVS: ftp: loaded support on port[0] = 21 [ 83.885221] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.948584] NET: Registered protocol family 30 [ 83.953221] Failed to register TIPC socket type [ 84.030955] device bridge_slave_1 entered promiscuous mode [ 84.592089] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.985021] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 85.497092] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 85.661203] team0: Port device team_slave_0 added [ 85.832147] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 85.964991] team0: Port device team_slave_1 added [ 86.239736] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 86.376104] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 86.976605] device hsr_slave_0 entered promiscuous mode [ 87.165395] device hsr_slave_1 entered promiscuous mode [ 87.377024] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 87.492916] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 87.747327] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 88.239482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.416298] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.638087] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.644393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.657171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.788758] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 88.878030] 8021q: adding VLAN 0 to HW filter on device team0 01:52:41 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) [ 89.606342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 89.613495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.685310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.693093] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.699728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.336734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 90.908512] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 91.157093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.164337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.465634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.696243] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.702681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.997711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.161903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 92.295712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.307081] IPVS: ftp: loaded support on port[0] = 21 [ 92.456296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 92.463468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.484059] NET: Registered protocol family 30 [ 92.489552] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.598703] Failed to register TIPC socket type [ 92.765487] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 92.774379] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.795511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.821172] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.954099] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 93.059326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.075374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.190920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 93.292934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.325380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.451097] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 93.555845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 93.732997] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 93.928105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 94.129150] audit: type=1400 audit(1559526766.675:38): avc: denied { associate } for pid=7793 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 94.199383] IPVS: ftp: loaded support on port[0] = 21 [ 94.323257] NET: Registered protocol family 30 [ 94.360331] IPVS: ftp: loaded support on port[0] = 21 [ 94.436849] Failed to register TIPC socket type [ 94.539668] NET: Registered protocol family 30 [ 94.544317] Failed to register TIPC socket type [ 94.671787] kasan: CONFIG_KASAN_INLINE enabled [ 94.754853] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 94.835329] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 94.841636] CPU: 0 PID: 8422 Comm: syz-executor.0 Not tainted 4.19.47 #19 [ 94.848662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.858048] RIP: 0010:proto_seq_show+0x52/0x8e0 [ 94.862732] Code: 00 00 e8 91 3b 0c fc 48 8d bb 50 ff ff ff 48 8d 83 70 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 d2 07 00 00 48 83 bb 50 ff ff ff 01 19 c0 83 e0 [ 94.881734] RSP: 0018:ffff88808d0673d0 EFLAGS: 00010a06 [ 94.887205] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90005e6f000 [ 94.894479] RDX: 1bd5a0000000000a RSI: ffffffff855ec8df RDI: dead000000000050 [ 94.901757] RBP: ffff88808d067460 R08: ffff888098100040 R09: ffffed100d1180d3 [ 94.909035] R10: ffffed100d1180d2 R11: ffff8880688c0693 R12: 00000000000002d4 [ 94.916315] R13: dead000000000100 R14: ffffffff87dc6ba0 R15: 0000000000001000 [ 94.923602] FS: 00007f89e4a84700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 94.931838] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 94.937741] CR2: 000000000061c500 CR3: 000000007aead000 CR4: 00000000001406f0 [ 94.945194] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 94.952464] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 94.959735] Call Trace: [ 94.962336] ? seq_list_next+0x5e/0x80 [ 94.966250] seq_read+0xaae/0x1110 [ 94.969806] ? seq_dentry+0x2d0/0x2d0 [ 94.973611] proc_reg_read+0x1f8/0x2b0 [ 94.977515] ? proc_reg_unlocked_ioctl+0x2a0/0x2a0 [ 94.982457] ? security_file_permission+0x89/0x230 [ 94.987402] ? rw_verify_area+0x118/0x360 [ 94.991567] do_iter_read+0x490/0x640 [ 94.995379] ? dup_iter+0x280/0x280 [ 94.999138] vfs_readv+0xf0/0x160 [ 95.002603] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 95.008152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 95.013728] ? push_pipe+0x417/0x7a0 [ 95.017468] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 95.023023] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 95.028230] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 95.033265] ? iov_iter_pipe+0xbe/0x2f0 [ 95.037281] default_file_splice_read+0x478/0x890 [ 95.042134] ? save_stack+0x45/0xd0 [ 95.045779] ? kasan_kmalloc+0xce/0xf0 [ 95.049674] ? __kmalloc+0x15d/0x750 [ 95.053399] ? iter_file_splice_write+0xbd0/0xbd0 [ 95.058255] ? cache_grow_end+0xa4/0x190 [ 95.062354] ? percpu_ref_put_many+0x94/0x190 [ 95.066879] ? __inode_security_revalidate+0xda/0x120 [ 95.072238] ? avc_policy_seqno+0xd/0x70 [ 95.076316] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 95.081353] ? security_file_permission+0x89/0x230 [ 95.086300] ? iter_file_splice_write+0xbd0/0xbd0 [ 95.091177] do_splice_to+0x127/0x180 [ 95.095008] splice_direct_to_actor+0x256/0x890 [ 95.099689] ? generic_pipe_buf_nosteal+0x10/0x10 [ 95.104540] ? do_splice_to+0x180/0x180 [ 95.108532] ? security_file_permission+0x89/0x230 [ 95.113477] ? rw_verify_area+0x118/0x360 [ 95.117736] do_splice_direct+0x1da/0x2a0 [ 95.121903] ? splice_direct_to_actor+0x890/0x890 [ 95.126781] ? security_file_permission+0x89/0x230 [ 95.131737] ? rw_verify_area+0x118/0x360 [ 95.135924] do_sendfile+0x597/0xce0 [ 95.139656] ? do_compat_pwritev64+0x1c0/0x1c0 [ 95.144257] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 95.149817] ? put_timespec64+0xda/0x140 [ 95.153900] __x64_sys_sendfile64+0x1dd/0x220 [ 95.158419] ? __ia32_sys_sendfile+0x230/0x230 [ 95.163009] ? do_syscall_64+0x26/0x620 [ 95.167002] ? lockdep_hardirqs_on+0x415/0x5d0 [ 95.171603] ? trace_hardirqs_on+0x67/0x220 [ 95.175938] do_syscall_64+0xfd/0x620 [ 95.179742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 95.184945] RIP: 0033:0x459279 [ 95.188150] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 95.207073] RSP: 002b:00007f89e4a83c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 95.214795] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 95.228756] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 95.236047] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 95.243330] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f89e4a846d4 [ 95.250776] R13: 00000000004c65f3 R14: 00000000004db268 R15: 00000000ffffffff [ 95.258060] Modules linked in: [ 95.439978] IPVS: ftp: loaded support on port[0] = 21 [ 95.467207] ---[ end trace 6c726e4e2f43d668 ]--- [ 95.485217] RIP: 0010:proto_seq_show+0x52/0x8e0 [ 95.494776] Code: 00 00 e8 91 3b 0c fc 48 8d bb 50 ff ff ff 48 8d 83 70 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 d2 07 00 00 48 83 bb 50 ff ff ff 01 19 c0 83 e0 [ 95.545658] RSP: 0018:ffff88808d0673d0 EFLAGS: 00010a06 [ 95.565717] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90005e6f000 [ 95.573106] RDX: 1bd5a0000000000a RSI: ffffffff855ec8df RDI: dead000000000050 [ 95.595817] RBP: ffff88808d067460 R08: ffff888098100040 R09: ffffed100d1180d3 [ 95.614788] R10: ffffed100d1180d2 R11: ffff8880688c0693 R12: 00000000000002d4 [ 95.635045] R13: dead000000000100 R14: ffffffff87dc6ba0 R15: 0000000000001000 [ 95.642414] FS: 00007f89e4a84700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 95.665190] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 95.685202] CR2: 00007f89e4a20db8 CR3: 000000007aead000 CR4: 00000000001406e0 [ 95.705206] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 95.718354] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 95.726333] Kernel panic - not syncing: Fatal exception [ 95.732973] Kernel Offset: disabled [ 95.736663] Rebooting in 86400 seconds..