[ 33.865489] kauditd_printk_skb: 9 callbacks suppressed [ 33.865499] audit: type=1800 audit(1559568711.051:33): pid=6913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 33.893416] audit: type=1800 audit(1559568711.051:34): pid=6913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 38.174325] random: sshd: uninitialized urandom read (32 bytes read) [ 38.485246] audit: type=1400 audit(1559568715.671:35): avc: denied { map } for pid=7087 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 38.533439] random: sshd: uninitialized urandom read (32 bytes read) [ 39.195978] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.64' (ECDSA) to the list of known hosts. [ 44.729533] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/03 13:32:02 fuzzer started [ 44.931058] audit: type=1400 audit(1559568722.121:36): avc: denied { map } for pid=7096 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 46.647109] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/03 13:32:04 dialing manager at 10.128.0.105:42191 2019/06/03 13:32:04 syscalls: 2440 2019/06/03 13:32:04 code coverage: enabled 2019/06/03 13:32:04 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/03 13:32:04 extra coverage: extra coverage is not supported by the kernel 2019/06/03 13:32:04 setuid sandbox: enabled 2019/06/03 13:32:04 namespace sandbox: enabled 2019/06/03 13:32:04 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/03 13:32:04 fault injection: enabled 2019/06/03 13:32:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/03 13:32:04 net packet injection: enabled 2019/06/03 13:32:04 net device setup: enabled 13:32:06 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032000000acc200000104000002000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae64af0e68fd043482c8"], 0x1) sendfile(r3, r4, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 13:32:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, 0x0, 0x5abc) 13:32:06 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat$selinux_create(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000001d80)={'mangle\x00'}, &(0x7f0000001e00)=0x54) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', 0x0, &(0x7f0000000b00)={{}, {}, [{}]}, 0x2c, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file1\x00') lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000500)={0x0, 0xfb, 0x15, 0x0, 0x9, "09d587884f4d817fc4ae204ca72193d1"}, 0x15, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f00000006c0)) 13:32:06 executing program 2: syz_emit_ethernet(0x102, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x73, 0x0, @initdev, @local}, @igmp}}}}, 0x0) 13:32:06 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0xfffd, 0x2000) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000057000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0xfffffffffffffffd, &(0x7f000002e000)={{}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) 13:32:06 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) socket(0x0, 0x2003, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0xfffffffffffffffd}, 0x80000000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, 0xfffffffffffffffd) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x7fffe, 0xffff) ioctl(r3, 0x200, &(0x7f0000000880)="0a5c510d77345f8f7600709a8dcef2c427f1309ff2995f9b016625befd30dacd2d929c04d4b403830799aaab5e246cc79f6125e98f206e6f3dfe49afe53f6072037263c3129cbc7d8f003d0c57e11c9efc5d624d1fcd44f5d7431981335eac1e7ca941980c32d7cb095361f5110c3d21abb823fdee50d45d706d16bb96721c5b604c90aaf7f519b71f9d9944f7579bee3ad04c846ddce1a76f0e6c4796d69484a2a28f0e555562774b63edea36c0961dbe723433d741354297a394ae29f25b5b5c17acc0691a1c6700000000000000000000005b96b03b6534050000000000000000") r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=0xffffffffffffffff, 0x4) r6 = fcntl$getown(r5, 0x9) r7 = getpgid(r6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r8 = socket$inet6(0xa, 0x7, 0x3) ioctl(r8, 0x5a, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe005, 0x1, &(0x7f0000000380)=[{&(0x7f0000000140)="eb3c906d6b66732e64617400020401000200027000f801", 0x17}], 0x10808410, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f00000001c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000640)=ANY=[]) r9 = perf_event_open(&(0x7f0000940000)={0x2, 0xfffffffffffffdcd, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x110, r9, 0x0) [ 49.354522] audit: type=1400 audit(1559568726.541:37): avc: denied { map } for pid=7096 comm="syz-fuzzer" path="/root/syzkaller-shm117249913" dev="sda1" ino=16489 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 49.424506] audit: type=1400 audit(1559568726.561:38): avc: denied { map } for pid=7114 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=26 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 50.280265] IPVS: ftp: loaded support on port[0] = 21 [ 50.551681] NET: Registered protocol family 30 [ 50.556418] Failed to register TIPC socket type [ 51.389814] IPVS: ftp: loaded support on port[0] = 21 [ 51.407699] NET: Registered protocol family 30 [ 51.425492] Failed to register TIPC socket type [ 51.564365] chnl_net:caif_netlink_parms(): no params data found [ 51.882582] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.889414] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.950419] device bridge_slave_0 entered promiscuous mode [ 52.010872] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.017360] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.071078] device bridge_slave_1 entered promiscuous mode [ 52.493564] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 52.762771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 53.377795] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 53.520345] team0: Port device team_slave_0 added [ 53.686828] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 53.812943] team0: Port device team_slave_1 added [ 53.975791] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 54.369173] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 54.786295] device hsr_slave_0 entered promiscuous mode [ 55.265471] device hsr_slave_1 entered promiscuous mode [ 55.417177] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 55.596533] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 55.947366] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 56.642393] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.765866] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.963668] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.969938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.982231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.193902] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 57.256980] 8021q: adding VLAN 0 to HW filter on device team0 [ 57.439641] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.541096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.549297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.673069] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.679634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.844296] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.901540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.908753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.041599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.130327] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.137256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.267296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.315156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.410729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.460320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.570863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.665157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.678722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.776409] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.868343] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.876932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.951460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.026300] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 59.081184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.089067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.174559] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 59.291882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.299700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.381402] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 59.387527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.581471] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 59.715902] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.116665] audit: type=1400 audit(1559568737.301:39): avc: denied { map } for pid=7729 comm="syz-executor.0" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=27341 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 60.185979] hrtimer: interrupt took 26805 ns [ 60.291701] kasan: CONFIG_KASAN_INLINE enabled [ 60.325858] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 60.383276] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 60.389662] Modules linked in: [ 60.392889] CPU: 0 PID: 7735 Comm: syz-executor.0 Not tainted 4.14.123 #17 [ 60.399926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.409322] task: ffff88807e51e4c0 task.stack: ffff888070720000 [ 60.415413] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 60.420088] RSP: 0018:ffff888070727478 EFLAGS: 00010a06 [ 60.425465] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc9000603e000 [ 60.432758] RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 [ 60.440046] RBP: ffff888070727508 R08: ffff888096e29a08 R09: ffffed1012f3ad2c [ 60.447594] R10: ffffed1012f3ad2b R11: ffff8880979d695d R12: dffffc0000000000 [ 60.454884] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3fe0 [ 60.462175] FS: 00007fa1ffa16700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 60.470506] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 60.476408] CR2: 0000001b3062d000 CR3: 000000007c998000 CR4: 00000000001406f0 [ 60.483694] Call Trace: [ 60.486309] ? seq_list_next+0x5e/0x80 [ 60.490214] seq_read+0xb46/0x1280 [ 60.493863] ? seq_lseek+0x3c0/0x3c0 [ 60.497627] ? avc_policy_seqno+0x9/0x20 [ 60.501792] ? selinux_file_permission+0x85/0x480 [ 60.506665] proc_reg_read+0xfa/0x170 [ 60.510483] ? seq_lseek+0x3c0/0x3c0 [ 60.514270] do_iter_read+0x3e2/0x5b0 [ 60.518114] vfs_readv+0xd3/0x130 [ 60.521594] ? compat_rw_copy_check_uvector+0x310/0x310 [ 60.526996] ? iov_iter_get_pages_alloc+0x526/0xef0 [ 60.532037] ? iov_iter_pipe+0x9f/0x2c0 [ 60.536027] default_file_splice_read+0x421/0x7b0 [ 60.540878] ? __kmalloc+0x15d/0x7a0 [ 60.544688] ? alloc_pipe_info+0x15c/0x380 [ 60.548932] ? splice_direct_to_actor+0x5d2/0x7b0 [ 60.553800] ? do_splice_direct+0x18d/0x230 [ 60.558153] ? do_splice_direct+0x230/0x230 [ 60.562503] ? trace_hardirqs_on+0x10/0x10 [ 60.566757] ? check_preemption_disabled+0x3c/0x250 [ 60.571813] ? save_trace+0x290/0x290 [ 60.578152] ? fs_reclaim_acquire+0x20/0x20 [ 60.582501] ? __inode_security_revalidate+0xd6/0x130 [ 60.587718] ? avc_policy_seqno+0x9/0x20 [ 60.591798] ? selinux_file_permission+0x85/0x480 [ 60.596701] ? security_file_permission+0x89/0x1f0 [ 60.602360] ? rw_verify_area+0xea/0x2b0 [ 60.608773] ? do_splice_direct+0x230/0x230 [ 60.616589] do_splice_to+0x105/0x170 [ 60.620412] splice_direct_to_actor+0x222/0x7b0 [ 60.625183] ? generic_pipe_buf_nosteal+0x10/0x10 [ 60.630042] ? do_splice_to+0x170/0x170 [ 60.634039] do_splice_direct+0x18d/0x230 [ 60.638211] ? splice_direct_to_actor+0x7b0/0x7b0 [ 60.643075] ? rw_verify_area+0xea/0x2b0 [ 60.647157] do_sendfile+0x4db/0xbd0 [ 60.650892] ? do_compat_pwritev64+0x140/0x140 [ 60.655496] ? put_timespec64+0xb4/0x100 [ 60.659576] ? nsecs_to_jiffies+0x30/0x30 [ 60.663755] SyS_sendfile64+0x102/0x110 [ 60.667755] ? SyS_sendfile+0x130/0x130 [ 60.671747] ? do_syscall_64+0x53/0x640 [ 60.675737] ? SyS_sendfile+0x130/0x130 [ 60.679721] do_syscall_64+0x1e8/0x640 [ 60.683627] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 60.688490] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 60.693692] RIP: 0033:0x459279 [ 60.696984] RSP: 002b:00007fa1ffa15c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 60.704814] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 60.712129] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 60.719417] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 60.726700] R10: 0000000000008000 R11: 0000000000000246 R12: 00007fa1ffa166d4 [ 60.733991] R13: 00000000004c65f3 R14: 00000000004db268 R15: 00000000ffffffff [ 60.742590] Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 60.762100] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff888070727478 [ 60.838131] ---[ end trace 2498514918a390d9 ]--- [ 60.845838] Kernel panic - not syncing: Fatal exception [ 60.852485] Kernel Offset: disabled [ 60.856119] Rebooting in 86400 seconds..