Warning: Permanently added '10.128.10.9' (ECDSA) to the list of known hosts. 2019/06/03 17:40:43 fuzzer started syzkaller login: [ 53.478096] kauditd_printk_skb: 5 callbacks suppressed [ 53.478113] audit: type=1400 audit(1559583643.686:36): avc: denied { map } for pid=7766 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/03 17:40:46 dialing manager at 10.128.0.105:46883 2019/06/03 17:40:46 syscalls: 2456 2019/06/03 17:40:46 code coverage: enabled 2019/06/03 17:40:46 comparison tracing: enabled 2019/06/03 17:40:46 extra coverage: extra coverage is not supported by the kernel 2019/06/03 17:40:46 setuid sandbox: enabled 2019/06/03 17:40:46 namespace sandbox: enabled 2019/06/03 17:40:46 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/03 17:40:46 fault injection: enabled 2019/06/03 17:40:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/03 17:40:46 net packet injection: enabled 2019/06/03 17:40:46 net device setup: enabled 17:40:50 executing program 0: socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r1, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) [ 59.944921] audit: type=1400 audit(1559583650.156:37): avc: denied { map } for pid=7784 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1093 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 60.052465] IPVS: ftp: loaded support on port[0] = 21 [ 60.063633] NET: Registered protocol family 30 [ 60.068328] Failed to register TIPC socket type 17:40:50 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='nfs\x00', 0x0, &(0x7f000000a000)) [ 60.389611] IPVS: ftp: loaded support on port[0] = 21 [ 60.406277] NET: Registered protocol family 30 [ 60.410919] Failed to register TIPC socket type 17:40:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f00000003c0)) [ 60.830241] IPVS: ftp: loaded support on port[0] = 21 [ 60.856957] NET: Registered protocol family 30 [ 60.861594] Failed to register TIPC socket type 17:40:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xfe60) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000200)={{0x0, r1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}) [ 61.378794] IPVS: ftp: loaded support on port[0] = 21 [ 61.397065] NET: Registered protocol family 30 [ 61.401697] Failed to register TIPC socket type 17:40:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r1, 0x15}], 0x2, 0x0, 0x0, 0x0) [ 62.158999] IPVS: ftp: loaded support on port[0] = 21 [ 62.186871] NET: Registered protocol family 30 [ 62.191492] Failed to register TIPC socket type 17:40:52 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000080)) [ 62.755017] chnl_net:caif_netlink_parms(): no params data found [ 63.158220] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.243006] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.313081] device bridge_slave_0 entered promiscuous mode [ 63.374737] IPVS: ftp: loaded support on port[0] = 21 [ 63.393501] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.399983] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.494018] device bridge_slave_1 entered promiscuous mode [ 63.525591] NET: Registered protocol family 30 [ 63.530227] Failed to register TIPC socket type [ 64.073380] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 64.281057] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.954023] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.160625] team0: Port device team_slave_0 added [ 65.417436] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.572857] team0: Port device team_slave_1 added [ 65.764444] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 66.073495] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.980797] device hsr_slave_0 entered promiscuous mode [ 67.589046] device hsr_slave_1 entered promiscuous mode [ 68.007813] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 68.234676] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 68.680771] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.274109] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.473605] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 69.668134] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.792164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.800512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.944846] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 69.951007] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.157003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.312114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.320217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.451774] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.458412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.557111] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.663148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.671117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.770253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.820194] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.826654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.928220] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 71.032593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.086463] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 71.156316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.227580] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 71.320258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.350145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.434671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.523568] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 71.670832] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 71.833062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.841286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.933695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.972450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.073808] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 72.092232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.100188] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.214695] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 72.220841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.407709] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 72.519878] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.676650] audit: type=1400 audit(1559583662.886:38): avc: denied { associate } for pid=7785 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 73.072718] hrtimer: interrupt took 26867 ns 17:41:05 executing program 0: socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r1, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) 17:41:06 executing program 0: socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r1, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) 17:41:07 executing program 0: socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r1, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) [ 77.179906] IPVS: ftp: loaded support on port[0] = 21 [ 77.283958] NET: Registered protocol family 30 [ 77.291986] Failed to register TIPC socket type 17:41:07 executing program 0: socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r1, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) [ 77.399975] IPVS: ftp: loaded support on port[0] = 21 [ 77.435841] NET: Registered protocol family 30 [ 77.442302] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 77.447877] Failed to register TIPC socket type [ 77.450548] WARNING: CPU: 0 PID: 9 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 77.461668] IPVS: ftp: loaded support on port[0] = 21 [ 77.462609] Kernel panic - not syncing: panic_on_warn set ... [ 77.462609] [ 77.462623] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 4.19.47 #19 [ 77.462631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.462643] Call Trace: [ 77.462693] dump_stack+0x172/0x1f0 [ 77.462734] panic+0x263/0x507 [ 77.462749] ? __warn_printk+0xf3/0xf3 [ 77.462768] ? kmem_cache_free.cold+0x1c/0x23 [ 77.462794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 77.462809] ? __warn.cold+0x5/0x4a [ 77.462826] ? __warn+0xe8/0x1d0 [ 77.522434] ? kmem_cache_free.cold+0x1c/0x23 [ 77.526955] __warn.cold+0x20/0x4a [ 77.530528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 77.536097] ? kmem_cache_free.cold+0x1c/0x23 [ 77.540619] report_bug+0x263/0x2b0 [ 77.544278] do_error_trap+0x204/0x360 [ 77.548188] ? math_error+0x340/0x340 [ 77.552007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 77.557580] ? wake_up_klogd+0x99/0xd0 [ 77.561513] ? error_entry+0x76/0xd0 [ 77.565315] ? trace_hardirqs_off_caller+0x65/0x220 [ 77.570367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 77.575234] do_invalid_op+0x1b/0x20 [ 77.578965] invalid_op+0x14/0x20 [ 77.582435] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 77.587591] Code: e8 95 ab 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 66 38 88 49 8b 54 24 58 e8 44 3d b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 [ 77.606519] RSP: 0018:ffff8880aa237ba8 EFLAGS: 00010286 [ 77.611904] RAX: 0000000000000046 RBX: ffff888076061340 RCX: 0000000000000000 [ 77.619201] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed1015446f67 [ 77.626513] RBP: ffff8880aa237bc8 R08: 0000000000000046 R09: ffffed1015d04fe9 [ 77.634180] R10: ffffed1015d04fe8 R11: ffff8880ae827f47 R12: ffff8880733591c0 [ 77.641469] R13: 0000000000000000 R14: ffff8880733591c0 R15: ffff888076061650 [ 77.648793] ? vprintk_func+0x86/0x189 [ 77.652708] ? kmem_cache_free.cold+0x1c/0x23 [ 77.657266] __sk_destruct+0x4b4/0x6d0 [ 77.661197] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 77.666593] sk_destruct+0x7b/0x90 [ 77.670253] __sk_free+0xce/0x300 [ 77.673740] sk_free+0x42/0x50 [ 77.677041] tipc_sk_callback+0x48/0x60 [ 77.681135] rcu_process_callbacks+0xba0/0x1a30 [ 77.685845] ? __rcu_read_unlock+0x170/0x170 [ 77.690298] ? sched_clock+0x2e/0x50 [ 77.694040] __do_softirq+0x25c/0x921 [ 77.698069] ? pci_mmcfg_check_reserved+0x170/0x170 [ 77.703139] ? takeover_tasklets+0x7b0/0x7b0 [ 77.707581] run_ksoftirqd+0x8e/0x110 [ 77.711424] smpboot_thread_fn+0x6a3/0xa30 [ 77.715690] ? sort_range+0x30/0x30 [ 77.719333] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 77.724887] ? __kthread_parkme+0xfb/0x1b0 [ 77.729148] kthread+0x354/0x420 [ 77.732543] ? sort_range+0x30/0x30 [ 77.736186] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 77.741656] ret_from_fork+0x24/0x30 [ 77.746875] Kernel Offset: disabled [ 77.750661] Rebooting in 86400 seconds..