[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.612301][ T26] audit: type=1800 audit(1558157572.920:25): pid=8711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 58.655559][ T26] audit: type=1800 audit(1558157572.930:26): pid=8711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 58.714632][ T26] audit: type=1800 audit(1558157572.930:27): pid=8711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.56' (ECDSA) to the list of known hosts. 2019/05/18 05:33:04 fuzzer started 2019/05/18 05:33:06 dialing manager at 10.128.0.26:37669 2019/05/18 05:33:06 syscalls: 1006 2019/05/18 05:33:06 code coverage: enabled 2019/05/18 05:33:06 comparison tracing: enabled 2019/05/18 05:33:06 extra coverage: extra coverage is not supported by the kernel 2019/05/18 05:33:06 setuid sandbox: enabled 2019/05/18 05:33:06 namespace sandbox: enabled 2019/05/18 05:33:06 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/18 05:33:06 fault injection: enabled 2019/05/18 05:33:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/18 05:33:06 net packet injection: enabled 2019/05/18 05:33:06 net device setup: enabled 05:33:11 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) 05:33:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f00000000c0)=0x40000000000003, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000100)=""/80, 0x1c6}, 0x0) syzkaller login: [ 77.169264][ T8875] IPVS: ftp: loaded support on port[0] = 21 [ 77.179930][ T8875] NET: Registered protocol family 30 [ 77.185324][ T8875] Failed to register TIPC socket type [ 77.417368][ T8877] IPVS: ftp: loaded support on port[0] = 21 [ 77.427616][ T8877] NET: Registered protocol family 30 [ 77.432905][ T8877] Failed to register TIPC socket type 05:33:11 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x4000001}, 0x8) close(r0) [ 77.730540][ T8879] IPVS: ftp: loaded support on port[0] = 21 [ 77.740805][ T8879] NET: Registered protocol family 30 [ 77.755459][ T8879] Failed to register TIPC socket type 05:33:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x78, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 78.227388][ T8881] IPVS: ftp: loaded support on port[0] = 21 [ 78.257783][ T8881] NET: Registered protocol family 30 [ 78.263108][ T8881] Failed to register TIPC socket type 05:33:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x10, @ipv4=@multicast1=0x4000700}]}]}, 0x24}}, 0x0) [ 78.842832][ T8883] IPVS: ftp: loaded support on port[0] = 21 [ 78.869395][ T8883] NET: Registered protocol family 30 [ 78.874704][ T8883] Failed to register TIPC socket type 05:33:13 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$pppoe(r1, &(0x7f0000000240)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1000000000000003, @local, 'veth0_to_hsr\x00'}}, 0x1e) [ 79.532828][ T8885] IPVS: ftp: loaded support on port[0] = 21 [ 79.585460][ T8885] NET: Registered protocol family 30 [ 79.590779][ T8885] Failed to register TIPC socket type [ 80.432770][ T8875] chnl_net:caif_netlink_parms(): no params data found [ 80.848322][ T8875] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.946394][ T8875] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.017792][ T8875] device bridge_slave_0 entered promiscuous mode [ 81.121429][ T8875] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.165408][ T8875] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.246339][ T8875] device bridge_slave_1 entered promiscuous mode [ 81.856172][ T8875] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 82.126729][ T8875] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 82.916454][ T8875] team0: Port device team_slave_0 added [ 83.179121][ T8875] team0: Port device team_slave_1 added [ 84.402643][ T8875] device hsr_slave_0 entered promiscuous mode [ 84.790202][ T8875] device hsr_slave_1 entered promiscuous mode [ 87.415448][ T8875] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.774547][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.808124][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.033853][ T8875] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.428536][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.488394][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.686888][ T9072] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.694219][ T9072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.008326][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.036366][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.109641][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.297212][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.304306][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.730597][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.777280][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.041450][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.077181][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.512590][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.526074][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.639852][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.807165][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.975916][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.160130][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.237106][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.435944][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.976713][ T8875] 8021q: adding VLAN 0 to HW filter on device batadv0 05:33:32 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) 05:33:33 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) 05:33:35 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) [ 102.089194][ T9371] IPVS: ftp: loaded support on port[0] = 21 05:33:36 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) [ 102.569192][ T9371] NET: Registered protocol family 30 [ 102.574522][ T9371] Failed to register TIPC socket type [ 102.581947][ T9376] IPVS: ftp: loaded support on port[0] = 21 [ 102.867941][ T9374] IPVS: ftp: loaded support on port[0] = 21 [ 102.987308][ T9377] IPVS: ftp: loaded support on port[0] = 21 [ 102.995984][ T9375] IPVS: ftp: loaded support on port[0] = 21 [ 103.090297][ T9376] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. [ 103.615620][ T9376] ------------[ cut here ]------------ [ 103.621120][ T9376] kernel BUG at lib/list_debug.c:29! 05:33:38 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) [ 104.105331][ T9376] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 104.111447][ T9376] CPU: 1 PID: 9376 Comm: syz-executor.5 Not tainted 5.1.0+ #18 [ 104.118997][ T9376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.129087][ T9376] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 104.134983][ T9376] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 104.154591][ T9376] RSP: 0018:ffff88807a74fb88 EFLAGS: 00010282 [ 104.160654][ T9376] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 104.168649][ T9376] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100f4e9f63 [ 104.176619][ T9376] RBP: ffff88807a74fba0 R08: 0000000000000058 R09: ffffed1015d26011 [ 104.184594][ T9376] R10: ffffed1015d26010 R11: ffff8880ae930087 R12: ffffffff89544ab0 [ 104.192574][ T9376] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50 [ 104.200544][ T9376] FS: 0000000001dc2940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 104.209492][ T9376] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 104.216084][ T9376] CR2: ffffffffff600400 CR3: 000000007acaa000 CR4: 00000000001406e0 [ 104.224065][ T9376] Call Trace: [ 104.227378][ T9376] ? mutex_lock_nested+0x16/0x20 [ 104.232335][ T9376] proto_register+0x459/0x8e0 [ 104.237040][ T9376] ? lockdep_init_map+0x1be/0x6d0 [ 104.242088][ T9376] tipc_socket_init+0x1c/0x70 [ 104.246767][ T9376] tipc_init_net+0x32a/0x5b0 [ 104.251357][ T9376] ? tipc_exit_net+0x40/0x40 [ 104.255949][ T9376] ops_init+0xb6/0x410 [ 104.260021][ T9376] setup_net+0x2d3/0x740 [ 104.260523][ T3879] kobject: 'loop0' (00000000dc040124): kobject_uevent_env [ 104.264282][ T9376] ? copy_net_ns+0x1c0/0x340 [ 104.275979][ T9376] ? ops_init+0x410/0x410 [ 104.280311][ T9376] ? kasan_check_write+0x14/0x20 [ 104.285250][ T9376] ? down_read_killable+0x51/0x220 [ 104.290367][ T9376] copy_net_ns+0x1df/0x340 [ 104.294791][ T9376] create_new_namespaces+0x400/0x7b0 [ 104.300107][ T9376] unshare_nsproxy_namespaces+0xc2/0x200 [ 104.305748][ T9376] ksys_unshare+0x440/0x980 [ 104.310253][ T9376] ? trace_hardirqs_on+0x67/0x230 [ 104.315282][ T9376] ? walk_process_tree+0x2d0/0x2d0 [ 104.320392][ T9376] ? blkcg_exit_queue+0x30/0x30 [ 104.325248][ T9376] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 104.330714][ T9376] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.336781][ T9376] ? do_syscall_64+0x26/0x680 [ 104.341463][ T9376] ? lockdep_hardirqs_on+0x418/0x5d0 [ 104.346750][ T9376] __x64_sys_unshare+0x31/0x40 [ 104.351543][ T9376] do_syscall_64+0x103/0x680 [ 104.356154][ T9376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.362045][ T9376] RIP: 0033:0x45b897 [ 104.365953][ T9376] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 104.385555][ T9376] RSP: 002b:00007ffc6b238f58 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 104.393970][ T9376] RAX: ffffffffffffffda RBX: 000000000073c988 RCX: 000000000045b897 [ 104.401938][ T9376] RDX: 0000000000000000 RSI: 00007ffc6b238f00 RDI: 0000000040000000 [ 104.409909][ T9376] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 104.417876][ T9376] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000414ab0 [ 104.425846][ T9376] R13: 0000000000414b40 R14: 0000000000000000 R15: 0000000000000000 [ 104.433817][ T9376] Modules linked in: [ 104.435284][ T3879] kobject: 'loop0' (00000000dc040124): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:33:39 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) [ 105.361799][ T3879] kobject: 'loop0' (00000000dc040124): kobject_uevent_env [ 105.545297][ T3879] kobject: 'loop0' (00000000dc040124): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 106.670208][ T3879] kobject: 'loop0' (00000000dc040124): kobject_uevent_env [ 106.795339][ T3879] kobject: 'loop0' (00000000dc040124): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:33:41 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000140)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r0}) [ 107.962498][ T3879] kobject: 'loop0' (00000000dc040124): kobject_uevent_env [ 108.025303][ T3879] kobject: 'loop0' (00000000dc040124): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 112.957001][ T9376] ---[ end trace fb41c6153e935a43 ]--- [ 112.962540][ T9376] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 113.146000][ T9376] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 113.445302][ T9376] RSP: 0018:ffff88807a74fb88 EFLAGS: 00010282 [ 113.451416][ T9376] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000