[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 24.854657] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.440278] random: sshd: uninitialized urandom read (32 bytes read) [ 28.830295] random: sshd: uninitialized urandom read (32 bytes read) [ 29.581491] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. [ 35.333053] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/12 07:09:50 fuzzer started [ 36.688744] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 07:09:53 dialing manager at 10.128.0.26:42863 2018/09/12 07:09:53 syscalls: 1 2018/09/12 07:09:53 code coverage: enabled 2018/09/12 07:09:53 comparison tracing: enabled 2018/09/12 07:09:53 setuid sandbox: enabled 2018/09/12 07:09:53 namespace sandbox: enabled 2018/09/12 07:09:53 fault injection: enabled 2018/09/12 07:09:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/12 07:09:53 net packed injection: enabled 2018/09/12 07:09:53 net device setup: enabled [ 39.350912] random: crng init done 07:13:18 executing program 0: futex(&(0x7f0000000040), 0x3, 0x80000020, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003f40), 0x0, 0x0, &(0x7f0000004080)) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, "6e720200"}, 0x18) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000004100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000004200)={&(0x7f00000040c0), 0xc, &(0x7f00000041c0)={&(0x7f0000004140)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 07:13:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x8001, &(0x7f0000000180)=0x100000001, 0x404, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0xfff, &(0x7f000041e000/0x1000)=nil, 0x2) 07:13:18 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 07:13:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000002c0)) 07:13:18 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='statm\x00') symlinkat(&(0x7f0000000480)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000001240), 0x24, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 07:13:18 executing program 4: syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") [ 243.717814] IPVS: ftp: loaded support on port[0] = 21 [ 243.925202] IPVS: ftp: loaded support on port[0] = 21 [ 243.927162] IPVS: ftp: loaded support on port[0] = 21 [ 243.933232] IPVS: ftp: loaded support on port[0] = 21 [ 243.943127] IPVS: ftp: loaded support on port[0] = 21 [ 243.950895] kasan: CONFIG_KASAN_INLINE enabled [ 243.955617] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 243.963195] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 243.968598] kobject: 'lo' (0000000074b8515b): fill_kobj_path: path = '/devices/virtual/net/lo' [ 243.969438] CPU: 0 PID: 5579 Comm: syz-executor5 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 243.978409] kobject: 'queues' (00000000a6f3f4a1): kobject_add_internal: parent: 'lo', set: '' [ 243.986556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.986577] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 243.986591] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 243.986598] RSP: 0018:ffff88016797f928 EFLAGS: 00010a03 [ 243.996235] kobject: 'queues' (00000000a6f3f4a1): kobject_uevent_env [ 244.005127] RAX: dffffc0000000000 RBX: ffff8801cd5c1280 RCX: ffffffff8160aca1 [ 244.005135] RDX: 1bbc0048200002b6 RSI: ffffffff833deb15 RDI: dde00241000015b6 [ 244.005141] RBP: ffff88016797f948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 244.005148] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801d7a76bc0 [ 244.005156] R13: dde00241000015ae R14: ffff8801cd5c1318 R15: ffff8801cd5c1318 [ 244.005166] FS: 000000000154d940(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 244.005181] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 244.009931] kobject: 'queues' (00000000a6f3f4a1): kobject_uevent_env: filter function caused the event to drop! [ 244.028815] CR2: 0000000000482e00 CR3: 0000000167939000 CR4: 00000000001406f0 [ 244.028826] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 244.028832] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 244.028837] Call Trace: [ 244.028859] vfs_get_tree+0x1cb/0x5c0 [ 244.028876] mq_create_mount+0xe3/0x190 [ 244.028895] mq_init_ns+0x15a/0x210 [ 244.037935] kobject: 'rx-0' (00000000d566e77c): kobject_add_internal: parent: 'queues', set: 'queues' [ 244.040741] copy_ipcs+0x3d2/0x580 [ 244.040754] ? ipcns_get+0xe0/0xe0 [ 244.040777] ? do_mount+0x1db0/0x1db0 [ 244.040795] ? kmem_cache_alloc+0x33a/0x730 [ 244.048152] kobject: 'rx-0' (00000000d566e77c): kobject_uevent_env [ 244.055358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.055369] ? perf_event_namespaces+0x136/0x400 [ 244.055385] create_new_namespaces+0x376/0x900 [ 244.055401] ? sys_ni_syscall+0x20/0x20 [ 244.055415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.055434] ? ns_capable_common+0x13f/0x170 [ 244.062812] kobject: 'rx-0' (00000000d566e77c): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 244.069964] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 244.077408] kobject: 'tx-0' (00000000c2158b31): kobject_add_internal: parent: 'queues', set: 'queues' [ 244.085435] ksys_unshare+0x79c/0x10b0 [ 244.085450] ? walk_process_tree+0x440/0x440 [ 244.085465] ? lock_downgrade+0x900/0x900 [ 244.085485] ? kasan_check_read+0x11/0x20 [ 244.091618] kobject: 'tx-0' (00000000c2158b31): kobject_uevent_env [ 244.101576] ? do_raw_spin_unlock+0xa7/0x2f0 [ 244.101588] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 244.101604] ? kasan_check_write+0x14/0x20 [ 244.101614] ? do_raw_read_unlock+0x3f/0x60 [ 244.101628] ? do_syscall_64+0x9a/0x820 [ 244.101646] ? do_syscall_64+0x9a/0x820 [ 244.109454] kobject: 'tx-0' (00000000c2158b31): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 244.116171] ? lockdep_hardirqs_on+0x421/0x5c0 [ 244.116187] ? trace_hardirqs_on+0xbd/0x310 [ 244.116202] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.116221] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 244.137626] kobject: 'lo' (00000000437a466f): kobject_add_internal: parent: 'net', set: 'devices' [ 244.146779] ? __ia32_sys_prlimit64+0x8c0/0x8c0 [ 244.146799] __x64_sys_unshare+0x31/0x40 [ 244.146813] do_syscall_64+0x1b9/0x820 [ 244.146827] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 244.146841] ? syscall_return_slowpath+0x5e0/0x5e0 [ 244.146854] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.146876] ? trace_hardirqs_on_caller+0x310/0x310 [ 244.151921] kobject: 'lo' (00000000437a466f): kobject_uevent_env [ 244.153960] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 244.157774] kobject: 'lo' (00000000437a466f): fill_kobj_path: path = '/devices/virtual/net/lo' [ 244.162054] ? prepare_exit_to_usermode+0x291/0x3b0 [ 244.162070] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.162086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.162096] RIP: 0033:0x459d87 [ 244.162112] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.162125] RSP: 002b:00007ffe59036268 EFLAGS: 00000246 [ 244.168692] kobject: 'queues' (00000000e5e1d13a): kobject_add_internal: parent: 'lo', set: '' [ 244.173952] ORIG_RAX: 0000000000000110 [ 244.173960] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459d87 [ 244.173966] RDX: 0000000000000000 RSI: 00007ffe59036270 RDI: 0000000008000000 [ 244.173973] RBP: 0000000000930b28 R08: 0000000000000000 R09: 0000000000000018 [ 244.173980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 244.173987] R13: 0000000000412cc0 R14: 0000000000000000 R15: 0000000000000000 [ 244.174000] Modules linked in: [ 244.174048] ---[ end trace e047c94ca971e831 ]--- [ 244.187976] kobject: 'queues' (00000000e5e1d13a): kobject_uevent_env [ 244.192915] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 244.192932] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 244.210286] kobject: 'queues' (00000000e5e1d13a): kobject_uevent_env: filter function caused the event to drop! [ 244.212252] RSP: 0018:ffff88016797f928 EFLAGS: 00010a03 [ 244.224018] kobject: 'rx-0' (0000000077f23633): kobject_add_internal: parent: 'queues', set: 'queues' [ 244.229977] kobject: 'rx-0' (0000000077f23633): kobject_uevent_env [ 244.234106] RAX: dffffc0000000000 RBX: ffff8801cd5c1280 RCX: ffffffff8160aca1 [ 244.234115] RDX: 1bbc0048200002b6 RSI: ffffffff833deb15 RDI: dde00241000015b6 [ 244.234129] RBP: ffff88016797f948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 244.245292] kobject: 'rx-0' (0000000077f23633): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 244.249441] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801d7a76bc0 [ 244.255012] kobject: 'tx-0' (0000000005bc720f): kobject_add_internal: parent: 'queues', set: 'queues' [ 244.258321] R13: dde00241000015ae R14: ffff8801cd5c1318 R15: ffff8801cd5c1318 [ 244.263230] kobject: 'tx-0' (0000000005bc720f): kobject_uevent_env [ 244.266643] FS: 000000000154d940(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 244.271026] kobject: 'tx-0' (0000000005bc720f): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 244.280609] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 244.280623] CR2: 0000000000482e00 CR3: 0000000167939000 CR4: 00000000001406f0 [ 244.286892] kobject: 'lo' (00000000069850cc): kobject_add_internal: parent: 'net', set: 'devices' [ 244.289529] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 244.296323] kobject: 'lo' (00000000069850cc): kobject_uevent_env [ 244.300374] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 244.300384] Kernel panic - not syncing: Fatal exception [ 244.309500] kobject: 'lo' (00000000069850cc): fill_kobj_path: path = '/devices/virtual/net/lo' [ 244.314973] Kernel Offset: disabled [ 244.664001] Rebooting in 86400 seconds..