Warning: Permanently added '10.128.0.223' (ECDSA) to the list of known hosts. 2019/06/03 18:29:15 fuzzer started [ 59.911148] audit: type=1400 audit(1559586555.254:36): avc: denied { map } for pid=7778 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/03 18:29:17 dialing manager at 10.128.0.105:46883 2019/06/03 18:29:18 syscalls: 2456 2019/06/03 18:29:18 code coverage: enabled 2019/06/03 18:29:18 comparison tracing: enabled 2019/06/03 18:29:18 extra coverage: extra coverage is not supported by the kernel 2019/06/03 18:29:18 setuid sandbox: enabled 2019/06/03 18:29:18 namespace sandbox: enabled 2019/06/03 18:29:18 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/03 18:29:18 fault injection: enabled 2019/06/03 18:29:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/03 18:29:18 net packet injection: enabled 2019/06/03 18:29:18 net device setup: enabled 18:29:21 executing program 0: socket$kcm(0xa, 0x0, 0x11) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r1, &(0x7f0000000480)={&(0x7f0000000000), 0x10, 0x0}, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) [ 66.171857] audit: type=1400 audit(1559586561.514:37): avc: denied { map } for pid=7795 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1109 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 66.291659] IPVS: ftp: loaded support on port[0] = 21 [ 66.301385] NET: Registered protocol family 30 [ 66.305996] Failed to register TIPC socket type 18:29:21 executing program 1: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) writev(r1, &(0x7f0000001840)=[{&(0x7f0000000340)="0f", 0x1}], 0x1) 18:29:21 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) read$eventfd(r0, &(0x7f0000000100), 0x8) write$apparmor_exec(r0, 0x0, 0x0) [ 66.532640] IPVS: ftp: loaded support on port[0] = 21 [ 66.550147] NET: Registered protocol family 30 [ 66.554780] Failed to register TIPC socket type [ 66.769244] IPVS: ftp: loaded support on port[0] = 21 [ 66.788818] NET: Registered protocol family 30 [ 66.793442] Failed to register TIPC socket type 18:29:22 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r1, r0, 0x8, 0x0) vmsplice(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="06", 0x1}], 0x1, 0x0) [ 67.243367] IPVS: ftp: loaded support on port[0] = 21 [ 67.260448] NET: Registered protocol family 30 [ 67.265085] Failed to register TIPC socket type 18:29:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$netrom(0xffffffffffffff9c, &(0x7f0000000300)={{0x3, @netrom}, [@null, @netrom, @netrom, @null, @null, @bcast, @default, @netrom]}, 0x0) socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x6, 0x1, 0x2}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={r1, 0x4}, &(0x7f0000000480)=0x8) socket$inet6_sctp(0xa, 0x1, 0x84) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f00000000c0)={{0x0, 0xe66a, 0x1, 0x0, 0x1ff, 0x7fffffff}, 0x6, 0x8, 0x10000}) [ 67.743214] IPVS: ftp: loaded support on port[0] = 21 [ 67.780211] NET: Registered protocol family 30 [ 67.784841] Failed to register TIPC socket type 18:29:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x300}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 68.359537] IPVS: ftp: loaded support on port[0] = 21 [ 68.380169] NET: Registered protocol family 30 [ 68.385162] Failed to register TIPC socket type [ 69.311164] chnl_net:caif_netlink_parms(): no params data found [ 69.838842] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.907286] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.011757] device bridge_slave_0 entered promiscuous mode [ 70.110449] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.237047] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.326193] device bridge_slave_1 entered promiscuous mode [ 70.769101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.088209] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.631046] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 71.828394] team0: Port device team_slave_0 added [ 72.103125] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 72.247655] team0: Port device team_slave_1 added [ 72.465408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 72.727070] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 73.203083] device hsr_slave_0 entered promiscuous mode [ 73.389304] device hsr_slave_1 entered promiscuous mode [ 73.554256] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 73.674832] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 73.927552] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 74.477205] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.657558] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.828505] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.834792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.857487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.027740] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 75.094769] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.237621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.244828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.264019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.352432] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.359114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.499661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 75.580244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.596928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.696810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.787886] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.796328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.917659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 75.938849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.041431] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 76.111540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.183593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 76.237509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.245836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.351076] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.408528] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.422148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.457876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.523382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 76.586304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.594171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.673124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 76.746295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.754010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.862450] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 76.917145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.009919] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 77.250064] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.621019] audit: type=1400 audit(1559586572.964:38): avc: denied { associate } for pid=7796 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 79.390948] audit: type=1400 audit(1559586574.734:39): avc: denied { map_create } for pid=8343 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 79.530051] IPVS: ftp: loaded support on port[0] = 21 [ 79.807871] NET: Registered protocol family 30 [ 79.812545] Failed to register TIPC socket type [ 79.860154] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 79.868367] WARNING: CPU: 1 PID: 18 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 79.876184] Kernel panic - not syncing: panic_on_warn set ... [ 79.876184] [ 79.883571] CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 4.19.47 #19 [ 79.890081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.899637] Call Trace: [ 79.902248] dump_stack+0x172/0x1f0 [ 79.905899] panic+0x263/0x507 [ 79.909122] ? __warn_printk+0xf3/0xf3 [ 79.913344] ? kmem_cache_free.cold+0x1c/0x23 [ 79.917868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 79.923697] ? __warn.cold+0x5/0x4a [ 79.927430] ? __warn+0xe8/0x1d0 [ 79.931339] ? kmem_cache_free.cold+0x1c/0x23 [ 79.936028] __warn.cold+0x20/0x4a [ 79.940116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 79.946297] ? kmem_cache_free.cold+0x1c/0x23 [ 79.952518] report_bug+0x263/0x2b0 [ 79.956166] do_error_trap+0x204/0x360 [ 79.961037] ? math_error+0x340/0x340 [ 79.970603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 79.977700] ? wake_up_klogd+0x99/0xd0 [ 79.981588] ? error_entry+0x76/0xd0 [ 79.985291] ? trace_hardirqs_off_caller+0x65/0x220 [ 79.990390] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 79.995229] do_invalid_op+0x1b/0x20 [ 79.998945] invalid_op+0x14/0x20 [ 80.002391] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 80.007674] Code: e8 95 ab 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 66 38 88 49 8b 54 24 58 e8 44 3d b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 [ 80.027007] RSP: 0018:ffff8880aa2a7ba8 EFLAGS: 00010286 [ 80.033578] RAX: 0000000000000046 RBX: ffff8880a1e5f3c0 RCX: 0000000000000000 [ 80.041127] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed1015454f67 [ 80.048659] RBP: ffff8880aa2a7bc8 R08: 0000000000000046 R09: ffffed1015d24fe9 [ 80.055934] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffff888095761c00 [ 80.063459] R13: 0000000000000000 R14: ffff888095761c00 R15: ffff8880a1e5f6d0 [ 80.070735] ? vprintk_func+0x86/0x189 [ 80.074616] ? kmem_cache_free.cold+0x1c/0x23 [ 80.079721] __sk_destruct+0x4b4/0x6d0 [ 80.083612] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 80.090627] sk_destruct+0x7b/0x90 [ 80.094274] __sk_free+0xce/0x300 [ 80.097732] sk_free+0x42/0x50 [ 80.101290] tipc_sk_callback+0x48/0x60 [ 80.105259] rcu_process_callbacks+0xba0/0x1a30 [ 80.109922] ? __rcu_read_unlock+0x170/0x170 [ 80.115024] ? sched_clock+0x2e/0x50 [ 80.118749] __do_softirq+0x25c/0x921 [ 80.122640] ? takeover_tasklets+0x7b0/0x7b0 [ 80.127051] run_ksoftirqd+0x8e/0x110 [ 80.130844] smpboot_thread_fn+0x6a3/0xa30 [ 80.135076] ? sort_range+0x30/0x30 [ 80.138695] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 80.144234] ? __kthread_parkme+0xfb/0x1b0 [ 80.148459] kthread+0x354/0x420 [ 80.151815] ? sort_range+0x30/0x30 [ 80.155432] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 80.160871] ret_from_fork+0x24/0x30 [ 80.166354] Kernel Offset: disabled [ 80.170101] Rebooting in 86400 seconds..