[info] Using makefile-style concurrent boot in runlevel 2. [ 15.540438][ C1] random: crng init done [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.91' (ECDSA) to the list of known hosts. 2019/09/03 13:13:45 fuzzer started 2019/09/03 13:13:47 dialing manager at 10.128.0.105:43075 2019/09/03 13:13:47 syscalls: 84 2019/09/03 13:13:47 code coverage: enabled 2019/09/03 13:13:47 comparison tracing: enabled 2019/09/03 13:13:47 extra coverage: enabled 2019/09/03 13:13:47 setuid sandbox: enabled 2019/09/03 13:13:47 namespace sandbox: enabled 2019/09/03 13:13:47 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/03 13:13:47 fault injection: enabled 2019/09/03 13:13:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/03 13:13:47 net packet injection: /dev/net/tun can't be opened (open /dev/net/tun: no such device) 2019/09/03 13:13:47 net device setup: enabled 13:13:48 executing program 0: syz_usb_connect(0x0, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0xd6, 0x60, 0x4a, 0x8, 0xaf0, 0x8120, 0x7584, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xc5, 0x0, 0x0, 0x7b, 0x44, 0x53}}]}}]}}, 0x0) 13:13:48 executing program 2: r0 = syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x12d43d) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) write$hidraw(r0, &(0x7f0000000000)="3a0ac17e00595345e24ea72cf22da8cf6bd8605cc6dd64", 0x141200) 13:13:48 executing program 5: syz_usb_connect(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x75, 0x74, 0xf2, 0x40, 0x50f, 0x180, 0xd765, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xf2, 0x0, 0x0, 0xbe, 0x71, 0xa4}}]}}]}}, 0x0) 13:13:48 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000900)={{0x12, 0x1, 0x310, 0x4a, 0x20, 0xf0, 0x20, 0x5ac, 0x21b, 0x7b1e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x37, 0x0, 0x0, 0x3, 0xb4, 0x2}}]}}]}}, &(0x7f0000000cc0)={0xa, &(0x7f0000000a40)={0xa}, 0x1, &(0x7f0000000a80)={0x5, 0xf, 0x51, 0x1, [@generic={0x4c, 0x10, 0x0, "8e0f733aa021d0fe5c02ee96140534c4a230f71815f0cb3e2b37d92e0b9985a88d69e0e2b2b02446a284972b3e3fae5df5bc72bb580fc5af6cfd407052f6a3e425439ef517a3d6d435"}]}}) 13:13:48 executing program 3: syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x8b, 0x33, 0xea, 0x8, 0x3eb, 0x2, 0x4a2d, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xba, 0x0, 0x1, 0x72, 0x77, 0x55, 0x0, [], [{{0x7, 0x5, 0x81}}]}}]}}]}}, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000080)=[0x0, 0x62]) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) 13:13:48 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x51, 0xdf, 0x3, 0x8, 0xc72, 0x14, 0x8b53, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x92, 0x0, 0x0, 0xf3, 0xd, 0xa6}}]}}]}}, 0x0) syz_usb_control_io(r0, &(0x7f0000000280)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000940)={0xac, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syzkaller login: [ 30.208232][ T1746] cgroup1: Unknown subsys name 'perf_event' [ 30.224191][ T1746] cgroup1: Unknown subsys name 'net_cls' [ 30.225530][ T1747] cgroup1: Unknown subsys name 'perf_event' [ 30.237108][ T1748] cgroup1: Unknown subsys name 'perf_event' [ 30.253409][ T1748] cgroup1: Unknown subsys name 'net_cls' [ 30.260386][ T1747] cgroup1: Unknown subsys name 'net_cls' [ 30.263991][ T1752] cgroup1: Unknown subsys name 'perf_event' [ 30.273618][ T1750] cgroup1: Unknown subsys name 'perf_event' [ 30.279968][ T1751] cgroup1: Unknown subsys name 'perf_event' [ 30.287884][ T1750] cgroup1: Unknown subsys name 'net_cls' [ 30.302777][ T1752] cgroup1: Unknown subsys name 'net_cls' [ 30.310227][ T1751] cgroup1: Unknown subsys name 'net_cls' 13:13:51 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000280)='/dev/../raw#\x00', 0x0, 0x7d) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000002c0)=""/65) syz_open_dev$hidraw(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x3, 0xfffffffffffffffc) r2 = syz_open_dev$hidraw(0x0, 0x0, 0x80402) r3 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f00000003c0)) r4 = syz_open_dev$hiddev(&(0x7f00000000c0)='/dev/usb/hiddev#\x00', 0x0, 0x0) ioctl$HIDIOCGSTRING(0xffffffffffffffff, 0x81044804, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) ioctl$HIDIOCGRAWNAME(0xffffffffffffffff, 0x80404804, &(0x7f0000000100)) write$hidraw(r2, &(0x7f0000000080)="c7", 0x20000081) syz_open_dev$hidraw(&(0x7f0000000180)='/dev/hidraw#\x00', 0x3, 0x2000) read$hidraw(0xffffffffffffffff, 0x0, 0x0) r5 = syz_usb_connect(0x6, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f00000001c0)=ANY=[@ANYBLOB="00d7a90000000000000000000000000000000000000000000100"/40]) read$hidraw(r2, &(0x7f0000000700)=""/4096, 0x1000) syz_usb_control_io(r5, 0x0, 0x0) ioctl$HIDIOCGRDESCSIZE(0xffffffffffffffff, 0x80044801, &(0x7f0000000380)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) syz_open_dev$hidraw(&(0x7f0000000140)='/dev/hidraw#\x00', 0x186f, 0x101900) ioctl$HIDIOCGSTRING(r4, 0x81044804, &(0x7f00000017c0)=ANY=[]) write$hidraw(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x1, 0x101802) ioctl$HIDIOCGRAWPHYS(r1, 0x80404805, &(0x7f0000005640)) ioctl$HIDIOCGFEATURE(0xffffffffffffffff, 0xc0404807, 0x0) syz_open_dev$hidraw(&(0x7f0000000040)='/dev/hidraw#\x00', 0x6, 0x3ffc) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000005700)={0x3, 0x200, 0x0, 0x5, 0x5000000000}) read$hidraw(0xffffffffffffffff, &(0x7f0000003200)=""/4096, 0xffffffad) write$hidraw(r2, &(0x7f0000000200)="b2119e62929d2caec0c03f5f3b8815ece0c03ae9719d8aaa2082bf9dfcfcdea5f43cf0aeb8f7960a88c2fd287e4bcbd55c5dba435a979851fedfc5195fcf498a5e372daa98a9067a5a427428db799adc9e04bd6357f8fe", 0xffffffc6) ioctl$HIDIOCAPPLICATION(r0, 0x8000450a, 0x7ffcb3dc7000) [ 33.403124][ T100] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 33.463346][ C0] ------------[ cut here ]------------ [ 33.469046][ C0] WARNING: CPU: 0 PID: 2739 at kernel/kcov.c:684 kcov_remote_start.cold+0xc/0x26 [ 33.478273][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 33.484892][ C0] CPU: 0 PID: 2739 Comm: modprobe Not tainted 5.3.0-rc7+ #0 [ 33.492520][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.502689][ C0] Call Trace: [ 33.506175][ C0] [ 33.509035][ C0] dump_stack+0xca/0x13e [ 33.513380][ C0] ? kcov_remote_stop+0x110/0x1bc [ 33.518641][ C0] panic+0x2a3/0x6da [ 33.522542][ C0] ? add_taint.cold+0x16/0x16 [ 33.527248][ C0] ? __probe_kernel_read+0x188/0x1d0 [ 33.532655][ C0] ? __warn.cold+0x5/0x4a [ 33.536996][ C0] ? __warn+0xe3/0x1e0 [ 33.541074][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 33.546451][ C0] __warn.cold+0x20/0x4a [ 33.550882][ C0] ? __irq_work_queue_local+0xa3/0xe0 [ 33.556288][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 33.561628][ C0] report_bug+0x262/0x2a0 [ 33.566136][ C0] do_error_trap+0x12b/0x1e0 [ 33.570737][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 33.576029][ C0] do_invalid_op+0x32/0x40 [ 33.580492][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 33.585794][ C0] invalid_op+0x23/0x30 [ 33.589964][ C0] RIP: 0010:kcov_remote_start.cold+0xc/0x26 [ 33.595962][ C0] Code: b0 f8 ff ff 48 c7 c7 d8 dd a4 86 e8 54 93 ea ff 0f 0b 5b 4c 89 e7 5d 41 5c e9 9d e7 2f 04 48 c7 c7 d8 dd a4 86 e8 3a 93 ea ff <0f> 0b e9 93 fd ff ff 48 c7 c7 d8 dd a4 86 e8 27 93 ea ff 0f 0b e9 [ 33.615662][ C0] RSP: 0018:ffff8881db209ae8 EFLAGS: 00010082 [ 33.621827][ C0] RAX: 0000000000000024 RBX: ffff8881d5669100 RCX: 0000000000000000 [ 33.629858][ C0] RDX: 0000000000000000 RSI: ffffffff81288ddd RDI: ffffed103b64134f [ 33.637843][ C0] RBP: ffff8881d5669100 R08: 0000000000000024 R09: ffffed103b645d58 [ 33.646012][ C0] R10: ffffed103b645d57 R11: ffff8881db22eabf R12: ffff8881c9cb0188 [ 33.654000][ C0] R13: ffff8881d5628038 R14: dffffc0000000000 R15: ffff8881c97d5c00 [ 33.661993][ C0] ? vprintk_func+0x7d/0x113 [ 33.666598][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 33.672025][ C0] dummy_timer+0x125f/0x301a [ 33.676758][ C0] ? lock_acquire+0x127/0x320 [ 33.681450][ C0] ? dummy_udc_probe+0x930/0x930 [ 33.686421][ C0] call_timer_fn+0x179/0x650 [ 33.691043][ C0] ? dummy_udc_probe+0x930/0x930 [ 33.696359][ C0] ? msleep_interruptible+0x130/0x130 [ 33.702246][ C0] ? do_raw_spin_lock+0x11a/0x280 [ 33.707559][ C0] ? mark_held_locks+0x9f/0xe0 [ 33.712344][ C0] ? _raw_spin_unlock_irq+0x24/0x30 [ 33.717732][ C0] ? dummy_udc_probe+0x930/0x930 [ 33.722698][ C0] run_timer_softirq+0x5cc/0x14b0 [ 33.728028][ C0] ? add_timer+0x7a0/0x7a0 [ 33.732818][ C0] ? mark_lock+0xbc/0x1130 [ 33.737258][ C0] __do_softirq+0x221/0x912 [ 33.741777][ C0] irq_exit+0x178/0x1a0 [ 33.745949][ C0] smp_apic_timer_interrupt+0x12f/0x500 [ 33.751507][ C0] apic_timer_interrupt+0xf/0x20 [ 33.756448][ C0] [ 33.759395][ C0] RIP: 0010:lock_acquire+0x16a/0x320 [ 33.764860][ C0] Code: c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 95 01 00 00 c7 83 44 08 00 00 00 00 00 00 ff 34 24 9d <48> 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 65 8b 15 60 18 dc 7e [ 33.784854][ C0] RSP: 0018:ffff8881b1bdfac0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 33.793495][ C0] RAX: 0000000000000007 RBX: ffff8881d34b6000 RCX: 00000000000050ed [ 33.801465][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881d34b6844 [ 33.809621][ C0] RBP: ffff8881cd7dd1c8 R08: ffffffff88d48348 R09: fffffbfff11ad792 [ 33.817688][ C0] R10: fffffbfff11ad791 R11: ffffffff88d6bc8f R12: 0000000000000000 [ 33.825783][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 33.833771][ C0] _raw_spin_lock+0x27/0x40 [ 33.838278][ C0] ? validate_mm+0x32b/0x610 [ 33.842985][ C0] validate_mm+0x32b/0x610 [ 33.847406][ C0] __vma_adjust+0xa57/0x17c0 [ 33.852183][ C0] __split_vma+0x2bd/0x560 [ 33.856596][ C0] split_vma+0x95/0xd0 [ 33.860669][ C0] mprotect_fixup+0x781/0x960 [ 33.865443][ C0] ? change_protection+0x1610/0x1610 [ 33.870767][ C0] ? do_mprotect_pkey+0x1cc/0x9b0 [ 33.875802][ C0] ? down_write_killable+0xe3/0x180 [ 33.881128][ C0] ? vmacache_find+0x62/0x300 [ 33.885940][ C0] ? vmacache_update+0xce/0x140 [ 33.890796][ C0] do_mprotect_pkey+0x55d/0x9b0 [ 33.896008][ C0] ? mprotect_fixup+0x960/0x960 [ 33.901060][ C0] ? trace_hardirqs_off_caller+0x55/0x1e0 [ 33.906894][ C0] __x64_sys_mprotect+0x74/0xb0 [ 33.911765][ C0] ? lockdep_hardirqs_on+0x379/0x580 [ 33.917064][ C0] do_syscall_64+0xb7/0x580 [ 33.921579][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 33.927468][ C0] RIP: 0033:0x7fc9ff558447 [ 33.932167][ C0] Code: 73 01 c3 48 8d 0d 5d ad 20 00 31 d2 48 29 c2 89 11 48 83 c8 ff eb eb 90 90 90 90 90 90 90 90 90 90 90 90 b8 0a 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 2d ad 20 00 31 d2 48 29 c2 89 [ 33.952205][ C0] RSP: 002b:00007fffcd6032d8 EFLAGS: 00000206 ORIG_RAX: 000000000000000a [ 33.960696][ C0] RAX: ffffffffffffffda RBX: 00007fc9ff7629d8 RCX: 00007fc9ff558447 [ 33.968681][ C0] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 00007fc9ff761000 [ 33.976803][ C0] RBP: 00007fffcd6033d0 R08: 0000000000000001 R09: 0000000000000007 [ 33.984862][ C0] R10: 00007fc9ff552a0b R11: 0000000000000206 R12: 00007fc9ff542000 [ 33.992825][ C0] R13: 00007fc9ff542a78 R14: 00007fc9ff552a0b R15: 00007fc9ff762028 [ 34.003763][ C0] Kernel Offset: disabled [ 34.008266][ C0] Rebooting in 86400 seconds..