[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 66.733088][ T24] audit: type=1800 audit(1558144456.885:25): pid=8790 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 66.774763][ T24] audit: type=1800 audit(1558144456.885:26): pid=8790 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 66.834846][ T24] audit: type=1800 audit(1558144456.885:27): pid=8790 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.59' (ECDSA) to the list of known hosts. 2019/05/18 01:54:27 fuzzer started 2019/05/18 01:54:30 dialing manager at 10.128.0.26:37669 2019/05/18 01:54:30 syscalls: 1006 2019/05/18 01:54:30 code coverage: enabled 2019/05/18 01:54:30 comparison tracing: enabled 2019/05/18 01:54:30 extra coverage: extra coverage is not supported by the kernel 2019/05/18 01:54:30 setuid sandbox: enabled 2019/05/18 01:54:30 namespace sandbox: enabled 2019/05/18 01:54:30 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/18 01:54:30 fault injection: enabled 2019/05/18 01:54:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/18 01:54:30 net packet injection: enabled 2019/05/18 01:54:30 net device setup: enabled 01:54:33 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)={0x14, 0x1e, 0x400000000000109}, 0x14}}, 0x0) r0 = socket(0x10000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 01:54:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="666639a12556", 0x6) syzkaller login: [ 83.683959][ T8956] IPVS: ftp: loaded support on port[0] = 21 [ 83.709420][ T8956] NET: Registered protocol family 30 [ 83.724980][ T8956] Failed to register TIPC socket type [ 83.804024][ T8958] IPVS: ftp: loaded support on port[0] = 21 [ 83.814282][ T8958] NET: Registered protocol family 30 [ 83.820123][ T8958] Failed to register TIPC socket type 01:54:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f719bd070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000000c0), 0x8) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 84.102237][ T8960] IPVS: ftp: loaded support on port[0] = 21 [ 84.129580][ T8960] NET: Registered protocol family 30 [ 84.135178][ T8960] Failed to register TIPC socket type 01:54:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r1, &(0x7f0000000200)="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", 0x200, 0x3200) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) [ 84.611993][ T8962] IPVS: ftp: loaded support on port[0] = 21 [ 84.638974][ T8962] NET: Registered protocol family 30 [ 84.644304][ T8962] Failed to register TIPC socket type 01:54:35 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 85.310290][ T8964] IPVS: ftp: loaded support on port[0] = 21 [ 85.348999][ T8964] NET: Registered protocol family 30 [ 85.354323][ T8964] Failed to register TIPC socket type 01:54:35 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg(r0, &(0x7f0000002e80)=[{{&(0x7f0000000140)=@nl=@proc, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000780)}}], 0x1, 0x1) [ 86.000259][ T8966] IPVS: ftp: loaded support on port[0] = 21 [ 86.019306][ T8966] NET: Registered protocol family 30 [ 86.044710][ T8966] Failed to register TIPC socket type [ 86.898071][ T8956] chnl_net:caif_netlink_parms(): no params data found [ 87.266949][ T8956] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.275828][ T8956] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.335758][ T8956] device bridge_slave_0 entered promiscuous mode [ 87.427174][ T8956] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.434379][ T8956] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.553072][ T8956] device bridge_slave_1 entered promiscuous mode [ 87.948143][ T8956] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 88.305159][ T8956] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 89.087698][ T8956] team0: Port device team_slave_0 added [ 89.427740][ T8956] team0: Port device team_slave_1 added [ 90.731724][ T8956] device hsr_slave_0 entered promiscuous mode [ 91.139754][ T8956] device hsr_slave_1 entered promiscuous mode [ 93.646118][ T8956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.217600][ T9039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.260695][ T9039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.520367][ T8956] 8021q: adding VLAN 0 to HW filter on device team0 [ 94.837824][ T9039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.916881][ T9039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.076390][ T9039] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.083677][ T9039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.579116][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.612980][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.765455][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.925314][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.932467][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.165054][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 96.336057][ T9039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 96.518604][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.546159][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.714267][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.937926][ T9039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 97.005890][ T9039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.187770][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.216815][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.488525][ T8956] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 97.789672][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 97.922850][ T9039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.988397][ T9039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 98.247252][ T8956] 8021q: adding VLAN 0 to HW filter on device batadv0 01:54:51 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)={0x14, 0x1e, 0x400000000000109}, 0x14}}, 0x0) r0 = socket(0x10000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 01:54:52 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)={0x14, 0x1e, 0x400000000000109}, 0x14}}, 0x0) r0 = socket(0x10000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 01:54:54 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)={0x14, 0x1e, 0x400000000000109}, 0x14}}, 0x0) r0 = socket(0x10000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 106.131108][ T9449] IPVS: ftp: loaded support on port[0] = 21 [ 106.143825][ T9452] IPVS: ftp: loaded support on port[0] = 21 [ 106.379172][ T9449] NET: Registered protocol family 30 [ 106.384528][ T9449] Failed to register TIPC socket type [ 106.393079][ T9455] IPVS: ftp: loaded support on port[0] = 21 [ 106.699104][ T9452] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. [ 106.811376][ T9456] IPVS: ftp: loaded support on port[0] = 21 01:54:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000402000001001000b7050000230000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="f3c2000091dc437c9d0000000000", 0x0}, 0x28) [ 107.141107][ T9457] IPVS: ftp: loaded support on port[0] = 21 [ 107.244994][ T9452] ------------[ cut here ]------------ [ 107.250512][ T9452] kernel BUG at lib/list_debug.c:29! [ 107.744737][ T9452] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 107.750849][ T9452] CPU: 0 PID: 9452 Comm: syz-executor.3 Not tainted 5.1.0+ #18 [ 107.758386][ T9452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.768459][ T9452] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 107.774450][ T9452] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 107.794234][ T9452] RSP: 0018:ffff88807e5cfb88 EFLAGS: 00010282 [ 107.800312][ T9452] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 107.808313][ T9452] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100fcb9f63 [ 107.816286][ T9452] RBP: ffff88807e5cfba0 R08: 0000000000000058 R09: ffffed1015d06011 [ 107.824261][ T9452] R10: ffffed1015d06010 R11: ffff8880ae830087 R12: ffffffff89544ab0 [ 107.832242][ T9452] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50 [ 107.840413][ T9452] FS: 00000000020be940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 107.849342][ T9452] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 107.855924][ T9452] CR2: 0000000000738000 CR3: 00000000947e4000 CR4: 00000000001406f0 [ 107.863902][ T9452] Call Trace: [ 107.867204][ T9452] ? mutex_lock_nested+0x16/0x20 [ 107.872149][ T9452] proto_register+0x459/0x8e0 [ 107.876854][ T9452] ? lockdep_init_map+0x1be/0x6d0 [ 107.881894][ T9452] tipc_socket_init+0x1c/0x70 [ 107.886577][ T9452] tipc_init_net+0x32a/0x5b0 [ 107.891167][ T9452] ? tipc_exit_net+0x40/0x40 [ 107.895857][ T9452] ops_init+0xb6/0x410 [ 107.899935][ T9452] setup_net+0x2d3/0x740 [ 107.904177][ T9452] ? copy_net_ns+0x1c0/0x340 [ 107.908785][ T9452] ? ops_init+0x410/0x410 [ 107.913116][ T9452] ? kasan_check_write+0x14/0x20 [ 107.918065][ T9452] ? down_read_killable+0x51/0x220 [ 107.923191][ T9452] copy_net_ns+0x1df/0x340 [ 107.927617][ T9452] create_new_namespaces+0x400/0x7b0 [ 107.932911][ T9452] unshare_nsproxy_namespaces+0xc2/0x200 [ 107.938569][ T9452] ksys_unshare+0x440/0x980 [ 107.943081][ T9452] ? trace_hardirqs_on+0x67/0x230 [ 107.948114][ T9452] ? walk_process_tree+0x2d0/0x2d0 [ 107.953231][ T9452] ? blkcg_exit_queue+0x30/0x30 [ 107.958086][ T9452] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 107.963555][ T9452] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.969630][ T9452] ? do_syscall_64+0x26/0x680 [ 107.974315][ T9452] ? lockdep_hardirqs_on+0x418/0x5d0 [ 107.979607][ T9452] __x64_sys_unshare+0x31/0x40 [ 107.984401][ T9452] do_syscall_64+0x103/0x680 [ 107.989102][ T9452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.994996][ T9452] RIP: 0033:0x45b897 [ 107.998989][ T9452] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 108.018598][ T9452] RSP: 002b:00007ffc770d35c8 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 108.027022][ T9452] RAX: ffffffffffffffda RBX: 000000000073c988 RCX: 000000000045b897 [ 108.034997][ T9452] RDX: 0000000000000000 RSI: 00007ffc770d3570 RDI: 0000000040000000 [ 108.042969][ T9452] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 108.050956][ T9452] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000414ab0 [ 108.058940][ T9452] R13: 0000000000414b40 R14: 0000000000000000 R15: 0000000000000000 [ 108.067014][ T9452] Modules linked in: 01:54:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000402000001001000b7050000230000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="f3c2000091dc437c9d0000000000", 0x0}, 0x28) [ 108.140092][ T3879] kobject: 'loop0' (00000000ae5b8d8e): kobject_uevent_env [ 108.534916][ T3879] kobject: 'loop0' (00000000ae5b8d8e): fill_kobj_path: path = '/devices/virtual/block/loop0' 01:54:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000402000001001000b7050000230000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="f3c2000091dc437c9d0000000000", 0x0}, 0x28) [ 109.480236][ T3879] kobject: 'loop0' (00000000ae5b8d8e): kobject_uevent_env [ 109.584705][ T3879] kobject: 'loop0' (00000000ae5b8d8e): fill_kobj_path: path = '/devices/virtual/block/loop0' 01:55:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000402000001001000b7050000230000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="f3c2000091dc437c9d0000000000", 0x0}, 0x28) [ 111.291248][ T3879] kobject: 'loop0' (00000000ae5b8d8e): kobject_uevent_env [ 111.405276][ T3879] kobject: 'loop0' (00000000ae5b8d8e): fill_kobj_path: path = '/devices/virtual/block/loop0'