Warning: Permanently added '10.128.10.33' (ECDSA) to the list of known hosts.
2019/05/26 13:04:31 fuzzer started
[   53.998203] audit: type=1400 audit(1558875871.850:36): avc:  denied  { map } for  pid=7927 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
2019/05/26 13:04:34 dialing manager at 10.128.0.105:44295
2019/05/26 13:04:34 syscalls: 2457
2019/05/26 13:04:34 code coverage: enabled
2019/05/26 13:04:34 comparison tracing: enabled
2019/05/26 13:04:34 extra coverage: extra coverage is not supported by the kernel
2019/05/26 13:04:34 setuid sandbox: enabled
2019/05/26 13:04:34 namespace sandbox: enabled
2019/05/26 13:04:34 Android sandbox: /sys/fs/selinux/policy does not exist
2019/05/26 13:04:34 fault injection: enabled
2019/05/26 13:04:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/05/26 13:04:34 net packet injection: enabled
2019/05/26 13:04:34 net device setup: enabled
13:04:47 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = socket(0x10, 0x80002, 0x0)
close(r1)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080))
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0, 0xfc5f}], 0x1}, 0x0)
sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492805, 0x0)

[   69.868218] audit: type=1400 audit(1558875887.720:37): avc:  denied  { map } for  pid=7945 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[   69.990553] IPVS: ftp: loaded support on port[0] = 21
[   70.000783] NET: Registered protocol family 30
[   70.005936] Failed to register TIPC socket type
13:04:47 executing program 1:
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_add_memb(r0, 0x107, 0x2, &(0x7f00000000c0)={0x0, 0x1, 0x6, @local}, 0x10)

[   70.267083] IPVS: ftp: loaded support on port[0] = 21
[   70.286603] NET: Registered protocol family 30
[   70.291415] Failed to register TIPC socket type
13:04:48 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5551c8d5210899d6b5b6d5efcd76ffc06e3e62e26c761a6047d17f3aed967ad2b907cfeae2cb7df923371fd5e810447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d8087"], 0xe6}}, 0x0)
syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c")

[   70.565006] IPVS: ftp: loaded support on port[0] = 21
[   70.584798] NET: Registered protocol family 30
[   70.589520] Failed to register TIPC socket type
13:04:48 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7fbcd26167f6444b666b5023d6da31997c5864183bb5551c8d5210899d6b5b6d5efcd76ffc06e3e62e26c761a6047d17f3aed967ad2b907cfeae2cb7df923371fd5e810447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d8a9d7039d2c88658fdc197346946806aca29bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6ba"], 0xe1}}, 0x0)
syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c")

[   71.178567] IPVS: ftp: loaded support on port[0] = 21
[   71.196697] NET: Registered protocol family 30
[   71.201358] Failed to register TIPC socket type
13:04:49 executing program 4:
mlockall(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
munlockall()
mlockall(0x1)
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)

[   71.819926] IPVS: ftp: loaded support on port[0] = 21
[   71.867673] NET: Registered protocol family 30
[   71.893071] Failed to register TIPC socket type
13:04:50 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070")
sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x74, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}]}, 0x74}}, 0x0)
syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8fc481e5eb85ee000000a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100")

[   72.416138] IPVS: ftp: loaded support on port[0] = 21
[   72.446094] NET: Registered protocol family 30
[   72.450728] Failed to register TIPC socket type
[   72.889162] chnl_net:caif_netlink_parms(): no params data found
[   73.289037] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.373848] bridge0: port 1(bridge_slave_0) entered disabled state
[   73.452295] device bridge_slave_0 entered promiscuous mode
[   73.543155] bridge0: port 2(bridge_slave_1) entered blocking state
[   73.549842] bridge0: port 2(bridge_slave_1) entered disabled state
[   73.683383] device bridge_slave_1 entered promiscuous mode
[   74.253361] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   74.389033] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   74.996469] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   75.168357] team0: Port device team_slave_0 added
[   75.390487] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   75.523027] team0: Port device team_slave_1 added
[   75.624568] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   75.956396] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   76.567525] device hsr_slave_0 entered promiscuous mode
[   76.804776] device hsr_slave_1 entered promiscuous mode
[   77.018770] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   77.164764] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   77.493832] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   78.194279] 8021q: adding VLAN 0 to HW filter on device bond0
[   78.434660] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   78.615822] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   78.622065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   78.653843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   78.864042] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   78.984508] 8021q: adding VLAN 0 to HW filter on device team0
[   79.161818] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   79.331409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   79.382861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   79.546266] bridge0: port 1(bridge_slave_0) entered blocking state
[   79.552937] bridge0: port 1(bridge_slave_0) entered forwarding state
[   79.744068] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   79.794860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   79.802855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   79.972856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   80.143890] bridge0: port 2(bridge_slave_1) entered blocking state
[   80.150307] bridge0: port 2(bridge_slave_1) entered forwarding state
[   80.310662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[   80.448320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   80.600084] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   80.762397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   80.978976] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   81.149291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   81.183178] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   81.583825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   81.591021] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   81.618985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   81.825999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   82.030666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[   82.413420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   82.421247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   82.830395] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[   83.142862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   83.150761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   83.570609] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   83.798409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   84.236321] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[   84.803375] 8021q: adding VLAN 0 to HW filter on device batadv0
[   85.168133] audit: type=1400 audit(1558875903.020:38): avc:  denied  { associate } for  pid=7946 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
[   85.915789] IPVS: ftp: loaded support on port[0] = 21
[   86.036152] NET: Registered protocol family 30
[   86.040886] Failed to register TIPC socket type
[   86.164870] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048
[   86.173052] WARNING: CPU: 1 PID: 18 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23
[   86.180872] Kernel panic - not syncing: panic_on_warn set ...
[   86.180872] 
[   86.188270] CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 4.19.46 #18
[   86.194769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   86.204230] Call Trace:
[   86.206833]  dump_stack+0x172/0x1f0
[   86.210477]  panic+0x263/0x507
[   86.213675]  ? __warn_printk+0xf3/0xf3
[   86.217591]  ? kmem_cache_free.cold+0x1c/0x23
[   86.222092]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   86.227816]  ? __warn.cold+0x5/0x4a
[   86.231506]  ? __warn+0xe8/0x1d0
[   86.234885]  ? kmem_cache_free.cold+0x1c/0x23
[   86.239395]  __warn.cold+0x20/0x4a
[   86.242944]  ? lockdep_hardirqs_on+0x19b/0x5d0
[   86.247539]  ? kmem_cache_free.cold+0x1c/0x23
[   86.252130]  report_bug+0x263/0x2b0
[   86.255766]  do_error_trap+0x204/0x360
[   86.259656]  ? math_error+0x340/0x340
[   86.263465]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   86.269033]  ? wake_up_klogd+0x99/0xd0
[   86.272932]  ? error_entry+0x76/0xd0
[   86.276655]  ? trace_hardirqs_off_caller+0x65/0x220
[   86.281683]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[   86.286567]  do_invalid_op+0x1b/0x20
[   86.290985]  invalid_op+0x14/0x20
[   86.294449] RIP: 0010:kmem_cache_free.cold+0x1c/0x23
[   86.299576] Code: e8 25 8d 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 40 45 54 87 48 c7 c7 18 64 38 88 49 8b 54 24 58 e8 34 43 b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 40 45 54 87 48 c7 c7 18
[   86.318675] RSP: 0018:ffff8880aa2a7ba8 EFLAGS: 00010286
[   86.324053] RAX: 0000000000000046 RBX: ffff8880733789c0 RCX: 0000000000000000
[   86.331345] RDX: 0000000000000000 RSI: ffffffff81559e76 RDI: ffffed1015454f67
[   86.338638] RBP: ffff8880aa2a7bc8 R08: 0000000000000046 R09: ffffed1015d24fe9
[   86.345920] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffff88808e002c40
[   86.353203] R13: 0000000000000000 R14: ffff88808e002c40 R15: ffff888073378cd0
[   86.360512]  ? vprintk_func+0x86/0x189
[   86.364424]  ? kmem_cache_free.cold+0x1c/0x23
[   86.368932]  __sk_destruct+0x4b4/0x6d0
[   86.372855]  ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0
[   86.378251]  sk_destruct+0x7b/0x90
[   86.381798]  __sk_free+0xce/0x300
[   86.385261]  sk_free+0x42/0x50
[   86.388465]  tipc_sk_callback+0x48/0x60
[   86.392451]  rcu_process_callbacks+0xba0/0x1a30
[   86.397238]  ? __rcu_read_unlock+0x170/0x170
[   86.401648]  ? sched_clock+0x2e/0x50
[   86.405394]  __do_softirq+0x25c/0x921
[   86.409296]  ? takeover_tasklets+0x7b0/0x7b0
[   86.413719]  run_ksoftirqd+0x8e/0x110
[   86.417537]  smpboot_thread_fn+0x6a3/0xa30
[   86.421783]  ? sort_range+0x30/0x30
[   86.425423]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[   86.431063]  ? __kthread_parkme+0xfb/0x1b0
[   86.435425]  kthread+0x354/0x420
[   86.438804]  ? sort_range+0x30/0x30
[   86.442527]  ? kthread_delayed_work_timer_fn+0x290/0x290
[   86.447991]  ret_from_fork+0x24/0x30
[   86.452881] Kernel Offset: disabled
[   86.456902] Rebooting in 86400 seconds..