[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.464253][ T26] audit: type=1800 audit(1558135956.124:25): pid=8714 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 61.506860][ T26] audit: type=1800 audit(1558135956.134:26): pid=8714 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 61.547380][ T26] audit: type=1800 audit(1558135956.134:27): pid=8714 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.122' (ECDSA) to the list of known hosts. 2019/05/17 23:32:46 fuzzer started 2019/05/17 23:32:49 dialing manager at 10.128.0.26:37669 2019/05/17 23:32:49 syscalls: 1006 2019/05/17 23:32:49 code coverage: enabled 2019/05/17 23:32:49 comparison tracing: enabled 2019/05/17 23:32:49 extra coverage: extra coverage is not supported by the kernel 2019/05/17 23:32:49 setuid sandbox: enabled 2019/05/17 23:32:49 namespace sandbox: enabled 2019/05/17 23:32:49 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/17 23:32:49 fault injection: enabled 2019/05/17 23:32:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/17 23:32:49 net packet injection: enabled 2019/05/17 23:32:49 net device setup: enabled 23:32:50 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200), &(0x7f00000002c0)=0x4) r1 = socket$inet6(0xa, 0x0, 0xdb80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000300)={0x0, {{0x2, 0x4e24, @broadcast}}}, 0x88) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x0, 0x100000000004}) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000580)={@remote={[], 0x1}, 0x3, 'veth0_to_bond\x00'}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x1a0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000500)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7fffffff, 0x4, [0xcb7, 0x0, 0x8e0c, 0x5]}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaa14000000000001907801000000f82faa3719f865f94e55e967752f580300000001080090780000000000000000000000000000000000000028c20cf089e017fcbf8caa17fe7178a3fae26bda70c3bd2fd36804d7647eb18c48987388d4a3cfce8256bddbae5565d57197a1ec18ed11e4fc0efc64600df7a8a5cd5b80ec5003bea0eadc51a7571cf7b85e96d8557b247376ebd29a03d61b80668ceaca9a7f0748c6f87534cc57e21e1e28059cd87ad07e5d73c539cd5bdf780ba92ea9d83ce8ce6a888fb33de2e1bfa1feeeeb10be15f1d6841412ebafc3b5e9cce7b39e78d900"/240], 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f00000006c0), &(0x7f0000000700)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f00000001c0)) syzkaller login: [ 76.015340][ T8881] IPVS: ftp: loaded support on port[0] = 21 [ 76.026218][ T8881] NET: Registered protocol family 30 [ 76.031638][ T8881] Failed to register TIPC socket type 23:32:50 executing program 1: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000020002551071c0165ff91fc020200000000100f000ee1000c08000b0000000000", 0x24) [ 76.263302][ T8883] IPVS: ftp: loaded support on port[0] = 21 [ 76.275084][ T8883] NET: Registered protocol family 30 [ 76.280778][ T8883] Failed to register TIPC socket type 23:32:51 executing program 2: syz_emit_ethernet(0x437, &(0x7f0000000700)={@local, @random="932114b35ee1", [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x88, 0x0, @dev, @local, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, 0x0) [ 76.638048][ T8885] IPVS: ftp: loaded support on port[0] = 21 [ 76.658633][ T8885] NET: Registered protocol family 30 [ 76.663988][ T8885] Failed to register TIPC socket type 23:32:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 77.195458][ T8887] IPVS: ftp: loaded support on port[0] = 21 [ 77.221000][ T8887] NET: Registered protocol family 30 [ 77.246656][ T8887] Failed to register TIPC socket type 23:32:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000100005, 0x500001c) ioctl(0xffffffffffffffff, 0x0, 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000080)='{', 0x1}], 0x1, 0x5e) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) [ 77.773862][ T8889] IPVS: ftp: loaded support on port[0] = 21 [ 77.811183][ T8889] NET: Registered protocol family 30 [ 77.836659][ T8889] Failed to register TIPC socket type 23:32:52 executing program 5: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) r1 = socket(0x20000000000000a, 0x2, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/172, 0xac}], 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bd070") close(r0) [ 78.495828][ T8891] IPVS: ftp: loaded support on port[0] = 21 [ 78.540898][ T8891] NET: Registered protocol family 30 [ 78.546233][ T8891] Failed to register TIPC socket type [ 79.084387][ T8881] chnl_net:caif_netlink_parms(): no params data found [ 79.418817][ T8881] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.428584][ T8881] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.527744][ T8881] device bridge_slave_0 entered promiscuous mode [ 79.583297][ T8881] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.678648][ T8881] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.797874][ T8881] device bridge_slave_1 entered promiscuous mode [ 80.369410][ T8881] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 80.659211][ T8881] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 81.509550][ T8881] team0: Port device team_slave_0 added [ 81.839795][ T8881] team0: Port device team_slave_1 added [ 83.162584][ T8881] device hsr_slave_0 entered promiscuous mode [ 83.540964][ T8881] device hsr_slave_1 entered promiscuous mode [ 85.958035][ T8881] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.489456][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.589583][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.770170][ T8881] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.113256][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.148784][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.300241][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.307629][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.620926][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.677321][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 87.819096][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.950740][ T9054] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.957914][ T9054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.238728][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.406113][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.581506][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.616033][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.849596][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.888477][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.048544][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.307826][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.367068][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.521654][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.675634][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.856239][ T8881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.390071][ T8881] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 92.798455][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 92.798471][ T26] audit: type=1804 audit(1558135987.464:31): pid=9343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir680713371/syzkaller.4IRsb3/0/memory.events" dev="sda1" ino=16313 res=1 [ 93.880538][ T26] audit: type=1804 audit(1558135988.534:32): pid=9341 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir680713371/syzkaller.4IRsb3/0/memory.events" dev="sda1" ino=16313 res=1 [ 94.789442][ T26] audit: type=1800 audit(1558135988.574:33): pid=9341 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16313 res=0 23:33:10 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200), &(0x7f00000002c0)=0x4) r1 = socket$inet6(0xa, 0x0, 0xdb80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000300)={0x0, {{0x2, 0x4e24, @broadcast}}}, 0x88) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x0, 0x100000000004}) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000580)={@remote={[], 0x1}, 0x3, 'veth0_to_bond\x00'}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x1a0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000500)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7fffffff, 0x4, [0xcb7, 0x0, 0x8e0c, 0x5]}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaa14000000000001907801000000f82faa3719f865f94e55e967752f580300000001080090780000000000000000000000000000000000000028c20cf089e017fcbf8caa17fe7178a3fae26bda70c3bd2fd36804d7647eb18c48987388d4a3cfce8256bddbae5565d57197a1ec18ed11e4fc0efc64600df7a8a5cd5b80ec5003bea0eadc51a7571cf7b85e96d8557b247376ebd29a03d61b80668ceaca9a7f0748c6f87534cc57e21e1e28059cd87ad07e5d73c539cd5bdf780ba92ea9d83ce8ce6a888fb33de2e1bfa1feeeeb10be15f1d6841412ebafc3b5e9cce7b39e78d900"/240], 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f00000006c0), &(0x7f0000000700)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f00000001c0)) [ 97.309304][ T26] audit: type=1804 audit(1558135991.974:34): pid=9361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir680713371/syzkaller.4IRsb3/1/memory.events" dev="sda1" ino=16317 res=1 [ 98.652470][ T9374] IPVS: ftp: loaded support on port[0] = 21 [ 99.157050][ T26] audit: type=1800 audit(1558135993.824:35): pid=9361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16317 res=0 [ 99.157156][ T9361] syz-executor.0 (9361) used greatest stack depth: 23312 bytes left [ 99.201319][ T9374] NET: Registered protocol family 30 [ 99.551110][ T9374] Failed to register TIPC socket type [ 99.581810][ T9376] IPVS: ftp: loaded support on port[0] = 21 [ 99.948149][ T9377] IPVS: ftp: loaded support on port[0] = 21 [ 99.957645][ T9375] IPVS: ftp: loaded support on port[0] = 21 [ 100.057131][ T9376] NET: Registered protocol family 30 [ 100.062505][ T9376] Failed to register TIPC socket type [ 100.350898][ T9375] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. [ 100.946928][ T9375] ------------[ cut here ]------------ [ 100.952440][ T9375] kernel BUG at lib/list_debug.c:29! 23:33:15 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200), &(0x7f00000002c0)=0x4) r1 = socket$inet6(0xa, 0x0, 0xdb80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000300)={0x0, {{0x2, 0x4e24, @broadcast}}}, 0x88) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x0, 0x100000000004}) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000580)={@remote={[], 0x1}, 0x3, 'veth0_to_bond\x00'}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x1a0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000500)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7fffffff, 0x4, [0xcb7, 0x0, 0x8e0c, 0x5]}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaa14000000000001907801000000f82faa3719f865f94e55e967752f580300000001080090780000000000000000000000000000000000000028c20cf089e017fcbf8caa17fe7178a3fae26bda70c3bd2fd36804d7647eb18c48987388d4a3cfce8256bddbae5565d57197a1ec18ed11e4fc0efc64600df7a8a5cd5b80ec5003bea0eadc51a7571cf7b85e96d8557b247376ebd29a03d61b80668ceaca9a7f0748c6f87534cc57e21e1e28059cd87ad07e5d73c539cd5bdf780ba92ea9d83ce8ce6a888fb33de2e1bfa1feeeeb10be15f1d6841412ebafc3b5e9cce7b39e78d900"/240], 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f00000006c0), &(0x7f0000000700)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f00000001c0)) [ 101.406597][ T9375] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 101.412725][ T9375] CPU: 0 PID: 9375 Comm: syz-executor.4 Not tainted 5.1.0+ #18 [ 101.420264][ T9375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.430345][ T9375] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 101.436291][ T9375] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 101.455916][ T9375] RSP: 0018:ffff88806fe2fb88 EFLAGS: 00010282 [ 101.461980][ T9375] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 101.469950][ T9375] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100dfc5f63 [ 101.477926][ T9375] RBP: ffff88806fe2fba0 R08: 0000000000000058 R09: ffffed1015d06011 [ 101.485898][ T9375] R10: ffffed1015d06010 R11: ffff8880ae830087 R12: ffffffff89544ab0 [ 101.493869][ T9375] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50 [ 101.501843][ T9375] FS: 0000000001c5e940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 101.510771][ T9375] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 101.517363][ T9375] CR2: ffffffffff600400 CR3: 000000006fcf4000 CR4: 00000000001406f0 [ 101.525339][ T9375] Call Trace: [ 101.528640][ T9375] ? mutex_lock_nested+0x16/0x20 [ 101.533581][ T9375] proto_register+0x459/0x8e0 [ 101.538268][ T9375] ? lockdep_init_map+0x1be/0x6d0 [ 101.543305][ T9375] tipc_socket_init+0x1c/0x70 [ 101.548015][ T9375] tipc_init_net+0x32a/0x5b0 [ 101.552616][ T9375] ? tipc_exit_net+0x40/0x40 [ 101.557223][ T9375] ops_init+0xb6/0x410 [ 101.561395][ T9375] setup_net+0x2d3/0x740 [ 101.565639][ T9375] ? copy_net_ns+0x1c0/0x340 [ 101.570285][ T9375] ? ops_init+0x410/0x410 [ 101.574625][ T9375] ? kasan_check_write+0x14/0x20 [ 101.579571][ T9375] ? down_read_killable+0x51/0x220 [ 101.584723][ T9375] copy_net_ns+0x1df/0x340 [ 101.589146][ T9375] create_new_namespaces+0x400/0x7b0 [ 101.594448][ T9375] unshare_nsproxy_namespaces+0xc2/0x200 [ 101.600090][ T9375] ksys_unshare+0x440/0x980 [ 101.604604][ T9375] ? trace_hardirqs_on+0x67/0x230 [ 101.609634][ T9375] ? walk_process_tree+0x2d0/0x2d0 [ 101.614755][ T9375] ? blkcg_exit_queue+0x30/0x30 [ 101.619612][ T9375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 101.625076][ T9375] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.631161][ T9375] ? do_syscall_64+0x26/0x680 [ 101.635846][ T9375] ? lockdep_hardirqs_on+0x418/0x5d0 [ 101.641146][ T9375] __x64_sys_unshare+0x31/0x40 [ 101.645930][ T9375] do_syscall_64+0x103/0x680 [ 101.650537][ T9375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.656454][ T9375] RIP: 0033:0x45b897 [ 101.660357][ T9375] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 101.679986][ T9375] RSP: 002b:00007ffddff9a2c8 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 101.688397][ T9375] RAX: ffffffffffffffda RBX: 000000000073c988 RCX: 000000000045b897 [ 101.696368][ T9375] RDX: 0000000000000000 RSI: 00007ffddff9a270 RDI: 0000000040000000 [ 101.704431][ T9375] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 101.712405][ T9375] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000414ab0 [ 101.720388][ T9375] R13: 0000000000414b40 R14: 0000000000000000 R15: 0000000000000000 [ 101.728379][ T9375] Modules linked in: [ 101.819650][ T9388] IPVS: ftp: loaded support on port[0] = 21 [ 102.499373][ T26] audit: type=1804 audit(1558135997.164:36): pid=9399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir680713371/syzkaller.4IRsb3/2/memory.events" dev="sda1" ino=16327 res=1 [ 105.087288][ T26] audit: type=1800 audit(1558135999.754:37): pid=9399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16327 res=0 23:33:20 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200), &(0x7f00000002c0)=0x4) r1 = socket$inet6(0xa, 0x0, 0xdb80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000300)={0x0, {{0x2, 0x4e24, @broadcast}}}, 0x88) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x0, 0x100000000004}) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000580)={@remote={[], 0x1}, 0x3, 'veth0_to_bond\x00'}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x1a0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000500)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7fffffff, 0x4, [0xcb7, 0x0, 0x8e0c, 0x5]}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaa14000000000001907801000000f82faa3719f865f94e55e967752f580300000001080090780000000000000000000000000000000000000028c20cf089e017fcbf8caa17fe7178a3fae26bda70c3bd2fd36804d7647eb18c48987388d4a3cfce8256bddbae5565d57197a1ec18ed11e4fc0efc64600df7a8a5cd5b80ec5003bea0eadc51a7571cf7b85e96d8557b247376ebd29a03d61b80668ceaca9a7f0748c6f87534cc57e21e1e28059cd87ad07e5d73c539cd5bdf780ba92ea9d83ce8ce6a888fb33de2e1bfa1feeeeb10be15f1d6841412ebafc3b5e9cce7b39e78d900"/240], 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f00000006c0), &(0x7f0000000700)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f00000001c0)) [ 106.116686][ T3877] kobject: 'loop0' (00000000aba4e9a0): kobject_uevent_env [ 106.123878][ T3877] kobject: 'loop0' (00000000aba4e9a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 107.567742][ T26] audit: type=1804 audit(1558136002.234:38): pid=9440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir680713371/syzkaller.4IRsb3/3/memory.events" dev="sda1" ino=16331 res=1 [ 109.617046][ T26] audit: type=1800 audit(1558136004.284:39): pid=9440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16331 res=0 [ 110.044171][ T3877] kobject: 'loop0' (00000000aba4e9a0): kobject_uevent_env [ 110.075117][ T3877] kobject: 'loop0' (00000000aba4e9a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 110.297005][ T9375] ---[ end trace dbd7103d503aaf4d ]--- [ 110.302538][ T9375] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 110.461229][ T9375] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 110.766568][ T9375] RSP: 0018:ffff88806fe2fb88 EFLAGS: 00010282 [ 110.837042][ T9375] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 110.845077][ T9375] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100dfc5f63