Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. 2019/06/03 15:37:18 fuzzer started [ 52.964880] audit: type=1400 audit(1559576238.612:36): avc: denied { map } for pid=7846 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/03 15:37:21 dialing manager at 10.128.0.105:46883 2019/06/03 15:37:21 syscalls: 2456 2019/06/03 15:37:21 code coverage: enabled 2019/06/03 15:37:21 comparison tracing: enabled 2019/06/03 15:37:21 extra coverage: extra coverage is not supported by the kernel 2019/06/03 15:37:21 setuid sandbox: enabled 2019/06/03 15:37:21 namespace sandbox: enabled 2019/06/03 15:37:21 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/03 15:37:21 fault injection: enabled 2019/06/03 15:37:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/03 15:37:21 net packet injection: enabled 2019/06/03 15:37:21 net device setup: enabled 15:37:24 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 58.378150] audit: type=1400 audit(1559576244.022:37): avc: denied { map } for pid=7864 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14976 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 58.468096] IPVS: ftp: loaded support on port[0] = 21 [ 58.478143] NET: Registered protocol family 30 [ 58.483305] Failed to register TIPC socket type 15:37:24 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x3e80000) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, 0x0) mount$overlay(0x400000, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40080, 0x0) [ 58.776230] IPVS: ftp: loaded support on port[0] = 21 15:37:24 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004001, 0x0) fallocate(r0, 0x0, 0x0, 0x400) [ 58.805179] NET: Registered protocol family 30 [ 58.809815] Failed to register TIPC socket type [ 59.088197] IPVS: ftp: loaded support on port[0] = 21 [ 59.105005] NET: Registered protocol family 30 [ 59.109632] Failed to register TIPC socket type 15:37:24 executing program 3: syz_emit_ethernet(0x42, &(0x7f0000000040)={@remote, @empty, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @empty, @rand_addr="21787041669d81261210f26caa75bc78", @broadcast, @local}}}}, 0x0) [ 59.438157] IPVS: ftp: loaded support on port[0] = 21 [ 59.455315] NET: Registered protocol family 30 [ 59.459949] Failed to register TIPC socket type 15:37:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) [ 60.023772] IPVS: ftp: loaded support on port[0] = 21 [ 60.053419] NET: Registered protocol family 30 [ 60.058056] Failed to register TIPC socket type 15:37:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f00000000c0), 0xe) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000), 0x4) [ 60.669485] IPVS: ftp: loaded support on port[0] = 21 [ 60.695224] NET: Registered protocol family 30 [ 60.699857] Failed to register TIPC socket type [ 61.515744] chnl_net:caif_netlink_parms(): no params data found [ 62.132585] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.139663] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.283503] device bridge_slave_0 entered promiscuous mode [ 62.293058] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.300583] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.433529] device bridge_slave_1 entered promiscuous mode [ 62.933353] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.178905] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.823315] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.953006] team0: Port device team_slave_0 added [ 64.226232] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.341523] team0: Port device team_slave_1 added [ 64.460089] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.773335] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.534558] device hsr_slave_0 entered promiscuous mode [ 65.793832] device hsr_slave_1 entered promiscuous mode [ 66.176376] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 66.382249] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 66.766629] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.604937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.870711] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.033016] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.039263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.083440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.252720] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 68.258881] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.533449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 68.540561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.592431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.662395] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.668931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.848137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 68.931937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.939263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.028103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.121551] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.128000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.226520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 69.298151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.394028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 69.473186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.544945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 69.604983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.622689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.693846] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 69.765057] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.781988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.842970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.971814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 69.981668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.989661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.131822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 70.203740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.226783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.290559] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 70.373568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.479510] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 70.665191] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.795497] audit: type=1400 audit(1559576256.442:38): avc: denied { associate } for pid=7865 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 15:37:37 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 72.614687] IPVS: ftp: loaded support on port[0] = 21 [ 72.793124] NET: Registered protocol family 30 [ 72.802754] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 72.810802] WARNING: CPU: 1 PID: 18 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 72.818616] Kernel panic - not syncing: panic_on_warn set ... [ 72.818616] [ 72.825998] CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 4.19.47 #19 [ 72.832499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.841863] Call Trace: [ 72.842752] kobject: 'loop0' (000000009af26933): kobject_uevent_env [ 72.844474] dump_stack+0x172/0x1f0 [ 72.854583] panic+0x263/0x507 [ 72.857798] ? __warn_printk+0xf3/0xf3 [ 72.860534] kobject: 'loop0' (000000009af26933): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 72.861699] ? kmem_cache_free.cold+0x1c/0x23 [ 72.861725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 72.861739] ? __warn.cold+0x5/0x4a [ 72.861750] ? __warn+0xe8/0x1d0 [ 72.861763] ? kmem_cache_free.cold+0x1c/0x23 [ 72.861783] __warn.cold+0x20/0x4a [ 72.861802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 72.902529] ? kmem_cache_free.cold+0x1c/0x23 [ 72.910807] report_bug+0x263/0x2b0 [ 72.914662] do_error_trap+0x204/0x360 [ 72.918579] ? math_error+0x340/0x340 [ 72.922403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 72.927970] ? wake_up_klogd+0x99/0xd0 [ 72.931887] ? error_entry+0x76/0xd0 [ 72.935626] ? trace_hardirqs_off_caller+0x65/0x220 15:37:38 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 72.940665] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 72.945540] do_invalid_op+0x1b/0x20 [ 72.949288] invalid_op+0x14/0x20 [ 72.953123] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 72.958277] Code: e8 95 ab 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 66 38 88 49 8b 54 24 58 e8 44 3d b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 [ 72.977463] RSP: 0018:ffff8880aa2a7ba8 EFLAGS: 00010286 [ 72.982848] RAX: 0000000000000046 RBX: ffff88809b70f700 RCX: 0000000000000000 [ 72.990137] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed1015454f67 [ 72.997420] RBP: ffff8880aa2a7bc8 R08: 0000000000000046 R09: ffffed1015d24fe9 [ 73.004717] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffff888081b170c0 [ 73.012006] R13: 0000000000000000 R14: ffff888081b170c0 R15: ffff88809b70fa10 [ 73.019316] ? vprintk_func+0x86/0x189 [ 73.023239] ? kmem_cache_free.cold+0x1c/0x23 [ 73.027763] __sk_destruct+0x4b4/0x6d0 [ 73.031672] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 73.035621] Failed to register TIPC socket type [ 73.037063] sk_destruct+0x7b/0x90 [ 73.037080] __sk_free+0xce/0x300 [ 73.037097] sk_free+0x42/0x50 [ 73.053638] tipc_sk_callback+0x48/0x60 [ 73.057636] rcu_process_callbacks+0xba0/0x1a30 [ 73.062684] ? __rcu_read_unlock+0x170/0x170 [ 73.067120] ? sched_clock+0x2e/0x50 [ 73.070897] __do_softirq+0x25c/0x921 [ 73.074726] ? pci_mmcfg_check_reserved+0x170/0x170 [ 73.079772] ? takeover_tasklets+0x7b0/0x7b0 [ 73.084199] run_ksoftirqd+0x8e/0x110 [ 73.088013] smpboot_thread_fn+0x6a3/0xa30 [ 73.092260] ? sort_range+0x30/0x30 [ 73.095890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 73.101430] ? __kthread_parkme+0xfb/0x1b0 [ 73.105680] kthread+0x354/0x420 [ 73.109061] ? sort_range+0x30/0x30 [ 73.112723] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 73.118204] ret_from_fork+0x24/0x30 [ 73.123346] Kernel Offset: disabled [ 73.127255] Rebooting in 86400 seconds..