Warning: Permanently added '10.128.0.223' (ECDSA) to the list of known hosts.
2019/06/03 18:29:15 fuzzer started
[   59.911148] audit: type=1400 audit(1559586555.254:36): avc:  denied  { map } for  pid=7778 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
2019/06/03 18:29:17 dialing manager at 10.128.0.105:46883
2019/06/03 18:29:18 syscalls: 2456
2019/06/03 18:29:18 code coverage: enabled
2019/06/03 18:29:18 comparison tracing: enabled
2019/06/03 18:29:18 extra coverage: extra coverage is not supported by the kernel
2019/06/03 18:29:18 setuid sandbox: enabled
2019/06/03 18:29:18 namespace sandbox: enabled
2019/06/03 18:29:18 Android sandbox: /sys/fs/selinux/policy does not exist
2019/06/03 18:29:18 fault injection: enabled
2019/06/03 18:29:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/06/03 18:29:18 net packet injection: enabled
2019/06/03 18:29:18 net device setup: enabled
18:29:21 executing program 0:
socket$kcm(0xa, 0x0, 0x11)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={<r0=>0x0, <r1=>0x0})
close(r0)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x3}, 0x2c)
setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd)
sendmsg$tipc(r1, &(0x7f0000000480)={&(0x7f0000000000), 0x10, 0x0}, 0x0)
write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0)

[   66.171857] audit: type=1400 audit(1559586561.514:37): avc:  denied  { map } for  pid=7795 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1109 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[   66.291659] IPVS: ftp: loaded support on port[0] = 21
[   66.301385] NET: Registered protocol family 30
[   66.305996] Failed to register TIPC socket type
18:29:21 executing program 1:
r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0)
exit(0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
writev(r1, &(0x7f0000001840)=[{&(0x7f0000000340)="0f", 0x1}], 0x1)

18:29:21 executing program 2:
r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
read$eventfd(r0, &(0x7f0000000100), 0x8)
write$apparmor_exec(r0, 0x0, 0x0)

[   66.532640] IPVS: ftp: loaded support on port[0] = 21
[   66.550147] NET: Registered protocol family 30
[   66.554780] Failed to register TIPC socket type
[   66.769244] IPVS: ftp: loaded support on port[0] = 21
[   66.788818] NET: Registered protocol family 30
[   66.793442] Failed to register TIPC socket type
18:29:22 executing program 3:
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
tee(r1, r0, 0x8, 0x0)
vmsplice(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="06", 0x1}], 0x1, 0x0)

[   67.243367] IPVS: ftp: loaded support on port[0] = 21
[   67.260448] NET: Registered protocol family 30
[   67.265085] Failed to register TIPC socket type
18:29:22 executing program 4:
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
accept$netrom(0xffffffffffffff9c, &(0x7f0000000300)={{0x3, @netrom}, [@null, @netrom, @netrom, @null, @null, @bcast, @default, @netrom]}, 0x0)
socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0)
r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0)
connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48)
listen(r0, 0x0)
getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={<r1=>0x0, 0x6, 0x1, 0x2}, &(0x7f0000000400)=0x10)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={r1, 0x4}, &(0x7f0000000480)=0x8)
socket$inet6_sctp(0xa, 0x1, 0x84)
accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
sendmsg$rds(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)}, 0x0)
ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f00000000c0)={{0x0, 0xe66a, 0x1, 0x0, 0x1ff, 0x7fffffff}, 0x6, 0x8, 0x10000})

[   67.743214] IPVS: ftp: loaded support on port[0] = 21
[   67.780211] NET: Registered protocol family 30
[   67.784841] Failed to register TIPC socket type
18:29:23 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x300}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34)

[   68.359537] IPVS: ftp: loaded support on port[0] = 21
[   68.380169] NET: Registered protocol family 30
[   68.385162] Failed to register TIPC socket type
[   69.311164] chnl_net:caif_netlink_parms(): no params data found
[   69.838842] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.907286] bridge0: port 1(bridge_slave_0) entered disabled state
[   70.011757] device bridge_slave_0 entered promiscuous mode
[   70.110449] bridge0: port 2(bridge_slave_1) entered blocking state
[   70.237047] bridge0: port 2(bridge_slave_1) entered disabled state
[   70.326193] device bridge_slave_1 entered promiscuous mode
[   70.769101] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   71.088209] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   71.631046] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   71.828394] team0: Port device team_slave_0 added
[   72.103125] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   72.247655] team0: Port device team_slave_1 added
[   72.465408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   72.727070] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   73.203083] device hsr_slave_0 entered promiscuous mode
[   73.389304] device hsr_slave_1 entered promiscuous mode
[   73.554256] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   73.674832] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   73.927552] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   74.477205] 8021q: adding VLAN 0 to HW filter on device bond0
[   74.657558] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   74.828505] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   74.834792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   74.857487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   75.027740] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   75.094769] 8021q: adding VLAN 0 to HW filter on device team0
[   75.237621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   75.244828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   75.264019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   75.352432] bridge0: port 1(bridge_slave_0) entered blocking state
[   75.359114] bridge0: port 1(bridge_slave_0) entered forwarding state
[   75.499661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   75.580244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   75.596928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   75.696810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   75.787886] bridge0: port 2(bridge_slave_1) entered blocking state
[   75.796328] bridge0: port 2(bridge_slave_1) entered forwarding state
[   75.917659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[   75.938849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   76.041431] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   76.111540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   76.183593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   76.237509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   76.245836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   76.351076] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   76.408528] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   76.422148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   76.457876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   76.523382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[   76.586304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   76.594171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   76.673124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[   76.746295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   76.754010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   76.862450] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   76.917145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   77.009919] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[   77.250064] 8021q: adding VLAN 0 to HW filter on device batadv0
[   77.621019] audit: type=1400 audit(1559586572.964:38): avc:  denied  { associate } for  pid=7796 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
[   79.390948] audit: type=1400 audit(1559586574.734:39): avc:  denied  { map_create } for  pid=8343 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1
[   79.530051] IPVS: ftp: loaded support on port[0] = 21
[   79.807871] NET: Registered protocol family 30
[   79.812545] Failed to register TIPC socket type
[   79.860154] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048
[   79.868367] WARNING: CPU: 1 PID: 18 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23
[   79.876184] Kernel panic - not syncing: panic_on_warn set ...
[   79.876184] 
[   79.883571] CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 4.19.47 #19
[   79.890081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   79.899637] Call Trace:
[   79.902248]  dump_stack+0x172/0x1f0
[   79.905899]  panic+0x263/0x507
[   79.909122]  ? __warn_printk+0xf3/0xf3
[   79.913344]  ? kmem_cache_free.cold+0x1c/0x23
[   79.917868]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   79.923697]  ? __warn.cold+0x5/0x4a
[   79.927430]  ? __warn+0xe8/0x1d0
[   79.931339]  ? kmem_cache_free.cold+0x1c/0x23
[   79.936028]  __warn.cold+0x20/0x4a
[   79.940116]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   79.946297]  ? kmem_cache_free.cold+0x1c/0x23
[   79.952518]  report_bug+0x263/0x2b0
[   79.956166]  do_error_trap+0x204/0x360
[   79.961037]  ? math_error+0x340/0x340
[   79.970603]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   79.977700]  ? wake_up_klogd+0x99/0xd0
[   79.981588]  ? error_entry+0x76/0xd0
[   79.985291]  ? trace_hardirqs_off_caller+0x65/0x220
[   79.990390]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[   79.995229]  do_invalid_op+0x1b/0x20
[   79.998945]  invalid_op+0x14/0x20
[   80.002391] RIP: 0010:kmem_cache_free.cold+0x1c/0x23
[   80.007674] Code: e8 95 ab 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 66 38 88 49 8b 54 24 58 e8 44 3d b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 c0 44 54 87 48 c7 c7 78
[   80.027007] RSP: 0018:ffff8880aa2a7ba8 EFLAGS: 00010286
[   80.033578] RAX: 0000000000000046 RBX: ffff8880a1e5f3c0 RCX: 0000000000000000
[   80.041127] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed1015454f67
[   80.048659] RBP: ffff8880aa2a7bc8 R08: 0000000000000046 R09: ffffed1015d24fe9
[   80.055934] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffff888095761c00
[   80.063459] R13: 0000000000000000 R14: ffff888095761c00 R15: ffff8880a1e5f6d0
[   80.070735]  ? vprintk_func+0x86/0x189
[   80.074616]  ? kmem_cache_free.cold+0x1c/0x23
[   80.079721]  __sk_destruct+0x4b4/0x6d0
[   80.083612]  ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0
[   80.090627]  sk_destruct+0x7b/0x90
[   80.094274]  __sk_free+0xce/0x300
[   80.097732]  sk_free+0x42/0x50
[   80.101290]  tipc_sk_callback+0x48/0x60
[   80.105259]  rcu_process_callbacks+0xba0/0x1a30
[   80.109922]  ? __rcu_read_unlock+0x170/0x170
[   80.115024]  ? sched_clock+0x2e/0x50
[   80.118749]  __do_softirq+0x25c/0x921
[   80.122640]  ? takeover_tasklets+0x7b0/0x7b0
[   80.127051]  run_ksoftirqd+0x8e/0x110
[   80.130844]  smpboot_thread_fn+0x6a3/0xa30
[   80.135076]  ? sort_range+0x30/0x30
[   80.138695]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[   80.144234]  ? __kthread_parkme+0xfb/0x1b0
[   80.148459]  kthread+0x354/0x420
[   80.151815]  ? sort_range+0x30/0x30
[   80.155432]  ? kthread_delayed_work_timer_fn+0x290/0x290
[   80.160871]  ret_from_fork+0x24/0x30
[   80.166354] Kernel Offset: disabled
[   80.170101] Rebooting in 86400 seconds..