Warning: Permanently added '10.128.10.46' (ECDSA) to the list of known hosts. 2019/09/03 12:57:55 fuzzer started 2019/09/03 12:57:56 dialing manager at 10.128.0.105:43075 2019/09/03 12:57:56 syscalls: 84 2019/09/03 12:57:56 code coverage: enabled 2019/09/03 12:57:56 comparison tracing: enabled 2019/09/03 12:57:56 extra coverage: enabled 2019/09/03 12:57:56 setuid sandbox: enabled 2019/09/03 12:57:56 namespace sandbox: enabled 2019/09/03 12:57:56 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/03 12:57:56 fault injection: enabled 2019/09/03 12:57:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/03 12:57:56 net packet injection: /dev/net/tun can't be opened (open /dev/net/tun: no such device) 2019/09/03 12:57:56 net device setup: enabled 12:57:57 executing program 0: syz_usb_connect(0x0, 0x2d, &(0x7f0000000280)=ANY=[@ANYBLOB="12010000b1a83c0800240042ef42000000e309021b00017600000009040000010209ad000705810b0600000000940453324e8efa6667bd7dfe096f1d4674d8c9c1002736e5ebfced64fb638b95f3189e11d46d419c36d88057eedd06c896559fac01d2089a2e5a9ab228e8422ba7f7fc7a16d80becbf2f0387eb4af67ae80c9c3090c87d98f85ba6c880debe4d774b9505284a148a23b9ad9a8ab86a241fcaf3ad80b479fb5d9cb40093951bffb3fe4eae6bee938970b8db980ed656cd8c4228f87748d8b59e02547e26d9224f275fb92df698ad407add1a942c3e09a3ec89c19dbe6832d84dbc4e4cb3b2fad7dadcaea6e1621f9e142a2425aea2178f26b6e7d1eb7dee6b10b94b5a77eb60bd012efe1ad56b8f8d68e91ff291b0eca5389bd4a52a0198f7d834933c20be7fab8e2b947ff12083644fb52862c85ed2eec99878188effd1b5c575e19d3285e3dcfeefc340120921307d72dbd2d90e7890b9c97e000000000000"], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 12:57:57 executing program 2: syz_usb_connect(0x0, 0x50, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x0) 12:57:57 executing program 5: syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x4001) write$hidraw(r0, &(0x7f0000000200)="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", 0x3fe00) 12:57:57 executing program 3: r0 = syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x12d43d) write$hidraw(r0, &(0x7f0000000200)="7f", 0x1) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)={0x4, 0x10001, 0xfffffffffffffffc, 0x1ff, 0x7, 0x7ff}) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000100)=[0x3159, 0x2]) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x400) 12:57:57 executing program 4: r0 = syz_open_dev$evdev(0x0, 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)={0x3ff, 0x0, 0x0, 0x0, "fd3092cfa1d4e8825e7ea0b9c68d3e18b5ae8b5ad5cdeda0622096a6bac826ff"}) syz_open_dev$evdev(&(0x7f0000001100)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$hidraw(&(0x7f0000000180)='/dev/hidraw#\x00', 0x7, 0x0) r1 = syz_open_dev$hidraw(&(0x7f00000012c0)='/dev/../raw#\x00', 0x0, 0x204) r2 = syz_open_dev$hidraw(0x0, 0x0, 0x4000) syz_open_dev$hidraw(0x0, 0x3, 0x0) r3 = syz_open_dev$hidraw(0x0, 0x0, 0x0) r4 = syz_open_dev$hidraw(0x0, 0x0, 0x201) read$hidraw(0xffffffffffffffff, 0x0, 0x0) write$hidraw(r4, &(0x7f0000001200)='\x00', 0xffffff45) ioctl$HIDIOCGRAWNAME(r1, 0x80404804, &(0x7f00000001c0)) syz_open_dev$hidraw(&(0x7f0000000200)='/dev/hidraw#\x00', 0x7, 0x10002) ioctl$HIDIOCGFEATURE(r3, 0xc0404807, &(0x7f00000002c0)={0x3, "f202d66332c2b641ced59d402047e214d9104569e843c2fddffd31744910a4f4ccc8fd18f1359bdb01ffc8239d2dca8a379275f1b0172d5699d52e6f8c9493f0"}) r5 = syz_open_dev$hiddev(&(0x7f0000000040)='/dev/usb/hiddev#\x00', 0x12d, 0x0) ioctl$HIDIOCGDEVINFO(r5, 0x801c4803, &(0x7f0000000240)=""/53) write$hidraw(r3, &(0x7f0000002480), 0x0) syz_open_dev$evdev(&(0x7f0000001100)='/dev/input/event#\x00', 0x6, 0x0) read$hidraw(r3, &(0x7f0000003200)=""/4096, 0xffffffad) read$hidraw(r2, &(0x7f0000003200)=""/4096, 0xffffffad) 12:57:57 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x63, 0xe4, 0xcb, 0x8, 0x4cc, 0x2533, 0x1262, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x40, 0x0, 0x0, 0x1e, 0xc7, 0x67}}]}}]}}, 0x0) syzkaller login: [ 26.578388][ T1742] cgroup1: Unknown subsys name 'perf_event' [ 26.585994][ T1742] cgroup1: Unknown subsys name 'net_cls' [ 26.595726][ T1743] cgroup1: Unknown subsys name 'perf_event' [ 26.598108][ T1744] cgroup1: Unknown subsys name 'perf_event' [ 26.613583][ T1743] cgroup1: Unknown subsys name 'net_cls' [ 26.617649][ T1746] cgroup1: Unknown subsys name 'perf_event' [ 26.623065][ T1745] cgroup1: Unknown subsys name 'perf_event' [ 26.626011][ T1746] cgroup1: Unknown subsys name 'net_cls' [ 26.634013][ T1748] cgroup1: Unknown subsys name 'perf_event' [ 26.643303][ T1744] cgroup1: Unknown subsys name 'net_cls' [ 26.645649][ T1745] cgroup1: Unknown subsys name 'net_cls' [ 26.658002][ T1748] cgroup1: Unknown subsys name 'net_cls' 12:58:00 executing program 5: syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x4001) write$hidraw(r0, &(0x7f0000000200)="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", 0x3fe00) 12:58:00 executing program 5: syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x4001) write$hidraw(r0, &(0x7f0000000200)="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", 0x3fe00) 12:58:00 executing program 5: syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x4001) write$hidraw(r0, &(0x7f0000000200)="69f4a84c9398459b7416b91b0496ee195f98d5293a0b8c5638b9a9b601f4831f927406c7aa9f9ff589426285aa1801b0ec2486b265678b8b83af211e38ac487eaedf3895780c92c4f5813165847a7375ec2cfee78128e25375e8366bc68eda70034e052ba6b00e0188cb0e9025a788b73f4c19d5f1f8a887ad8e507fdd19dfe0c8f85365e42c72f2e39750fed031b1ec43837c194deeb6614bb3fd5d8c815dc0563fb44ec3736a70260cc7531926429f94e6bd8a56eff48ef85147dc039e6e23549323a1aebcd1b421362c435f63d6398f3bcc0d060cff87af7582e4cd43e815e541be21c5f3e5a00ee0dc597618721459ff18f58750348e4dc60c8445285eacf34944ef243c81969527338613f518cede21a0556a8e70df7a10e032759beb26fba4b750a47057f99bda1eafdad6f6185b8839f798d1b7452f4782cef63f6ccc21da819354f5c6e32bf48162b940b040af350b83b491b000859a639c10f41b52148de2a511ae905cb6a118c31e173c2d4def2f5d60be27c3d656fa9c71131eb099da33bc3eae8716c75767069fde06b44a854dc2e84919bb09b4c669278eddcbb0b62bde73d553cea6dc1a4618ad82683ab7f417e80b9a60f19de6d8acb345ea3cdcc7bc7652aa51d6d94b6d630ad15e2537596cecf1c93c243e49e29a24f594d53a94b71b8cb6a5e593aad57981320ad468d9067d309d84e55c9f5ad7801336", 0x3fe00) 12:58:00 executing program 5: syz_usb_connect(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xd5, 0x23, 0x63, 0x10, 0x4bb, 0x515, 0xbaac, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x7a, 0x0, 0x2, 0x1b, 0x47, 0x65, 0x0, [], [{{0x9, 0x5, 0x85}}, {{0x9, 0x5, 0x3}}]}}]}}]}}, 0x0) [ 29.838252][ T12] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 29.887260][ C0] ------------[ cut here ]------------ [ 29.893074][ C0] WARNING: CPU: 0 PID: 342 at kernel/kcov.c:684 kcov_remote_start.cold+0xc/0x26 [ 29.902565][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 29.909407][ C0] CPU: 0 PID: 342 Comm: udevd Not tainted 5.3.0-rc7+ #0 [ 29.916988][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.928347][ C0] Call Trace: [ 29.931626][ C0] [ 29.934705][ C0] dump_stack+0xca/0x13e [ 29.938954][ C0] ? kcov_remote_stop+0x110/0x1bc [ 29.944226][ C0] panic+0x2a3/0x6da [ 29.948112][ C0] ? add_taint.cold+0x16/0x16 [ 29.952876][ C0] ? __probe_kernel_read+0x188/0x1d0 [ 29.958176][ C0] ? __warn.cold+0x5/0x4a [ 29.962489][ C0] ? __warn+0xe3/0x1e0 [ 29.966552][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 29.971934][ C0] __warn.cold+0x20/0x4a [ 29.976219][ C0] ? __irq_work_queue_local+0xa3/0xe0 [ 29.981783][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 29.987185][ C0] report_bug+0x262/0x2a0 [ 29.991709][ C0] do_error_trap+0x12b/0x1e0 [ 29.996298][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 30.001584][ C0] do_invalid_op+0x32/0x40 [ 30.006006][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 30.011390][ C0] invalid_op+0x23/0x30 [ 30.016493][ C0] RIP: 0010:kcov_remote_start.cold+0xc/0x26 [ 30.022634][ C0] Code: b0 f8 ff ff 48 c7 c7 d8 dd a4 86 e8 54 93 ea ff 0f 0b 5b 4c 89 e7 5d 41 5c e9 9d e7 2f 04 48 c7 c7 d8 dd a4 86 e8 3a 93 ea ff <0f> 0b e9 93 fd ff ff 48 c7 c7 d8 dd a4 86 e8 27 93 ea ff 0f 0b e9 [ 30.043079][ C0] RSP: 0018:ffff8881db209ae8 EFLAGS: 00010082 [ 30.049244][ C0] RAX: 0000000000000024 RBX: ffff8881d560bb80 RCX: 0000000000000000 [ 30.057380][ C0] RDX: 0000000000000000 RSI: ffffffff81288ddd RDI: ffffed103b64134f [ 30.065374][ C0] RBP: ffff8881d560bb80 R08: 0000000000000024 R09: ffffed103b645d58 [ 30.073515][ C0] R10: ffffed103b645d57 R11: ffff8881db22eabf R12: ffff8881c9c60788 [ 30.081597][ C0] R13: ffff8881d55ea138 R14: dffffc0000000000 R15: ffff8881cefe1800 [ 30.089572][ C0] ? vprintk_func+0x7d/0x113 [ 30.094252][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 30.100012][ C0] dummy_timer+0x125f/0x301a [ 30.104730][ C0] ? lock_acquire+0x127/0x320 [ 30.109396][ C0] ? dummy_udc_probe+0x930/0x930 [ 30.114491][ C0] call_timer_fn+0x179/0x650 [ 30.119196][ C0] ? dummy_udc_probe+0x930/0x930 [ 30.124132][ C0] ? msleep_interruptible+0x130/0x130 [ 30.129502][ C0] ? do_raw_spin_lock+0x11a/0x280 [ 30.134597][ C0] ? mark_held_locks+0x9f/0xe0 [ 30.139364][ C0] ? _raw_spin_unlock_irq+0x24/0x30 [ 30.144576][ C0] ? dummy_udc_probe+0x930/0x930 [ 30.149607][ C0] run_timer_softirq+0x5cc/0x14b0 [ 30.154672][ C0] ? add_timer+0x7a0/0x7a0 [ 30.159144][ C0] ? mark_lock+0xbc/0x1130 [ 30.163635][ C0] __do_softirq+0x221/0x912 [ 30.168121][ C0] irq_exit+0x178/0x1a0 [ 30.172259][ C0] smp_apic_timer_interrupt+0x12f/0x500 [ 30.177801][ C0] apic_timer_interrupt+0xf/0x20 [ 30.182725][ C0] [ 30.185665][ C0] RIP: 0010:copy_page_range+0xb9b/0x1ba0 [ 30.191520][ C0] Code: 85 c0 48 89 c3 0f 84 69 01 00 00 e8 5f 4d e4 ff 4c 8d 6b 08 4c 89 e8 48 c1 e8 03 42 80 3c 38 00 0f 85 5a 0d 00 00 4c 8b 63 08 <31> ff 49 89 de 4c 89 e6 83 e6 01 48 89 74 24 50 e8 c0 4e e4 ff 48 [ 30.211228][ C0] RSP: 0018:ffff8881d130f880 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 30.219757][ C0] RAX: 1ffffd4000e932c1 RBX: ffffea0007499600 RCX: 0000000000000000 [ 30.228564][ C0] RDX: 0000000000000000 RSI: ffffffff81598d41 RDI: 0000000000000006 [ 30.236903][ C0] RBP: 80000001d2658045 R08: ffff8881d122b000 R09: ffffed103a24c531 [ 30.244881][ C0] R10: ffffed103a24c530 R11: ffff8881d1262987 R12: ffffea00074995c8 [ 30.253199][ C0] R13: ffffea0007499608 R14: ffff8881d1262980 R15: dffffc0000000000 [ 30.261467][ C0] ? copy_page_range+0xb81/0x1ba0 [ 30.266591][ C0] ? __pmd_alloc+0x390/0x390 [ 30.271454][ C0] ? __down_timeout+0x2d0/0x2d0 [ 30.276303][ C0] ? validate_mm_rb+0x3e/0xb0 [ 30.281021][ C0] ? __vma_link_rb+0x251/0x360 [ 30.285781][ C0] dup_mm+0xa98/0x1180 [ 30.289890][ C0] ? vm_area_dup+0x170/0x170 [ 30.294476][ C0] ? lockdep_init_map+0x1b0/0x5e0 [ 30.299757][ C0] ? lockdep_init_map+0x1b0/0x5e0 [ 30.304786][ C0] copy_process+0x25d4/0x6700 [ 30.309560][ C0] ? __cleanup_sighand+0x50/0x50 [ 30.314577][ C0] _do_fork+0x129/0xec0 [ 30.319731][ C0] ? __fd_install+0x1b1/0x5b0 [ 30.325141][ C0] ? copy_init_mm+0x20/0x20 [ 30.329981][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 30.335390][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 30.341553][ C0] __x64_sys_clone+0x17e/0x200 [ 30.346859][ C0] ? __ia32_sys_vfork+0xc0/0xc0 [ 30.353436][ C0] ? do_pipe2+0x8d/0x160 [ 30.358814][ C0] ? trace_hardirqs_off_caller+0x55/0x1e0 [ 30.368366][ C0] do_syscall_64+0xb7/0x580 [ 30.373244][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 30.380709][ C0] RIP: 0033:0x7f2eb8b57f46 [ 30.385306][ C0] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 14 25 10 00 00 00 31 d2 49 81 c2 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 31 01 00 00 85 c0 41 89 c4 0f 85 3b 01 00 [ 30.405750][ C0] RSP: 002b:00007ffc66ccc5a0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 30.414453][ C0] RAX: ffffffffffffffda RBX: 00007ffc66ccc5a0 RCX: 00007f2eb8b57f46 [ 30.423152][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 30.431123][ C0] RBP: 00007ffc66ccc600 R08: 0000000000000156 R09: 0000000000000156 [ 30.439791][ C0] R10: 00007f2eb9474a70 R11: 0000000000000246 R12: 0000000000000000 [ 30.449051][ C0] R13: 00007ffc66ccc5c0 R14: 0000000000000005 R15: 0000000000000005 [ 30.457578][ C0] Kernel Offset: disabled [ 30.462585][ C0] Rebooting in 86400 seconds..