Warning: Permanently added '10.128.0.131' (ECDSA) to the list of known hosts. [ 65.738695] random: sshd: uninitialized urandom read (32 bytes read) 2019/05/28 14:04:59 fuzzer started [ 65.939605] audit: type=1400 audit(1559052299.652:36): avc: denied { map } for pid=7043 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 67.487328] random: cc1: uninitialized urandom read (8 bytes read) 2019/05/28 14:05:01 dialing manager at 10.128.0.105:39629 2019/05/28 14:05:02 syscalls: 2441 2019/05/28 14:05:02 code coverage: enabled 2019/05/28 14:05:02 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/05/28 14:05:02 extra coverage: extra coverage is not supported by the kernel 2019/05/28 14:05:02 setuid sandbox: enabled 2019/05/28 14:05:02 namespace sandbox: enabled 2019/05/28 14:05:02 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/28 14:05:02 fault injection: enabled 2019/05/28 14:05:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/28 14:05:02 net packet injection: enabled 2019/05/28 14:05:02 net device setup: enabled [ 69.926166] random: crng init done 14:05:15 executing program 0: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441400f4c458a8f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c05726400f0d18c443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000940)="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") 14:05:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x64}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 81.998452] audit: type=1400 audit(1559052315.712:37): avc: denied { map } for pid=7043 comm="syz-fuzzer" path="/root/syzkaller-shm136368686" dev="sda1" ino=16489 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 14:05:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x8, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}]}]}, 0x1c}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 14:05:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="02501275b6fa00000000432da45def90f300ffffffffffffeb010000750118000000990be4af704a6d3c8dcdbd99133f335d8b0e6906aa8d076b29f1a2cd3e8c8cd2016182c5380b2d438de689494ed4f56111d075fa1b84e861c7f37bf2773e76adf95c22de79baaa4f6cdfab6665262de10bb588bc843f8f0f07008f000000009a2f107ca48e3964878e557bc4a1c3106d847699aee763ca650b7136157651059a66784f0c4589a492be53fd6552fc7e0202a01d4388e69dafdf90a65525000000000000000beeacad14cae981a51d7e4959f609e488a28ae3550d136b1feb8dbd374552305e3afea6f95fd2e7c0ce0809e2812bad8263d0000800008e"], 0xfe}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:05:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x5e5}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4f814c1ab5be2f9660f3a0fae5e090000ba44d8d1c401f5ef1ac4817d73d74ec4a275bd153c78ab7749f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfdc402b504a60080000068d768f833c4a1cd61b3b23c0000ab26dbc1a1fe5ff6f6df0804f4c4efa59cc442abf58f104eb547288ba6452e000054c4431d3e660f6e7f3c") 14:05:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="02501275b6fa00000000432da45def90f300ffffffffffffeb010000750118000000990be4af704a6d3c8dcdbd9913"], 0x2f}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") syz_execute_func(&(0x7f00000006c0)="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") [ 82.026077] audit: type=1400 audit(1559052315.712:38): avc: denied { map } for pid=7062 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13747 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 82.760228] IPVS: ftp: loaded support on port[0] = 21 [ 83.031370] NET: Registered protocol family 30 [ 83.035988] Failed to register TIPC socket type [ 83.955949] chnl_net:caif_netlink_parms(): no params data found [ 83.971579] IPVS: ftp: loaded support on port[0] = 21 [ 84.065563] NET: Registered protocol family 30 [ 84.089533] Failed to register TIPC socket type [ 84.255804] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.320405] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.362726] device bridge_slave_0 entered promiscuous mode [ 84.423782] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.460194] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.504135] device bridge_slave_1 entered promiscuous mode [ 84.721238] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.932358] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 85.642345] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 85.664051] team0: Port device team_slave_0 added [ 85.873159] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 85.981506] team0: Port device team_slave_1 added [ 86.195077] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 86.575689] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 87.289111] device hsr_slave_0 entered promiscuous mode [ 87.577547] device hsr_slave_1 entered promiscuous mode [ 88.009715] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 88.167967] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 88.373535] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 88.779402] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.922944] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 89.056009] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.151069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.159118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.257386] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 89.330872] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.492077] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 89.499315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.523148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.609556] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.616203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.739591] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 89.805235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.821705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.878567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.930758] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.937173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.030886] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 90.038144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.141703] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 90.177224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.208803] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 90.297554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.330979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.347489] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 90.420296] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.427520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.495037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.545240] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 90.613579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.631272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.704956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 90.762155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.769859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.866319] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 90.930240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.023964] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 91.132319] 8021q: adding VLAN 0 to HW filter on device batadv0 14:05:27 executing program 0: socket$inet6(0xa, 0x40000080803, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000012c0)="98a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") [ 93.640047] hrtimer: interrupt took 42346 ns 14:05:28 executing program 0: socket$inet6(0xa, 0x40000080803, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000012c0)="98a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") [ 94.450987] IPVS: ftp: loaded support on port[0] = 21 [ 94.712248] NET: Registered protocol family 30 [ 94.716928] Failed to register TIPC socket type 14:05:29 executing program 0: socket$inet6(0xa, 0x40000080803, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000012c0)="98a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") 14:05:29 executing program 0: socket$inet6(0xa, 0x40000080803, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000012c0)="98a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") [ 96.940249] IPVS: ftp: loaded support on port[0] = 21 14:05:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x68, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x34, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14}, {0x14, 0x2, @in={0x2, 0x0, @multicast2}}}}]}]}, 0x68}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 97.182979] NET: Registered protocol family 30 [ 97.187624] Failed to register TIPC socket type 14:05:31 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1) fcntl$setown(r2, 0x8, 0x0) sendfile(r3, r4, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x1000000030a6d) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl(r5, 0xffffffffffffffb2, &(0x7f0000000040)) dup2(r6, r5) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5024, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) [ 97.654708] audit: type=1400 audit(1559052331.372:39): avc: denied { map } for pid=7726 comm="syz-executor.0" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=26605 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 97.751336] kasan: CONFIG_KASAN_INLINE enabled [ 97.763904] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 97.779357] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 97.785643] Modules linked in: [ 97.788852] CPU: 1 PID: 7727 Comm: syz-executor.0 Not tainted 4.14.122 #16 [ 97.795870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.805266] task: ffff888083eb25c0 task.stack: ffff88806d048000 [ 97.811742] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 97.816425] RSP: 0018:ffff88806d04f478 EFLAGS: 00010a06 [ 97.821974] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90005e25000 [ 97.829345] RDX: 1bd5a0000000000c RSI: ffffffff84cc751f RDI: dead000000000060 [ 97.836713] RBP: ffff88806d04f508 R08: ffff888072151348 R09: ffffed1012dd78d4 [ 97.844071] R10: ffffed1012dd78d3 R11: ffff888096ebc69d R12: dffffc0000000000 [ 97.851331] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3b20 [ 97.858599] FS: 00007fdc28cf1700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 97.866836] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 97.872731] CR2: 0000001b2d229000 CR3: 000000006cbe8000 CR4: 00000000001406e0 [ 97.879994] Call Trace: [ 97.882585] ? seq_list_next+0x5e/0x80 [ 97.886465] seq_read+0xb46/0x1280 [ 97.890117] ? seq_lseek+0x3c0/0x3c0 [ 97.893825] ? avc_policy_seqno+0x9/0x20 [ 97.897873] ? selinux_file_permission+0x85/0x480 [ 97.902709] proc_reg_read+0xfa/0x170 [ 97.906498] ? seq_lseek+0x3c0/0x3c0 [ 97.910346] do_iter_read+0x3e2/0x5b0 [ 97.914134] vfs_readv+0xd3/0x130 [ 97.917866] ? compat_rw_copy_check_uvector+0x310/0x310 [ 97.923242] ? push_pipe+0x3e6/0x780 [ 97.927144] ? iov_iter_pipe+0x9f/0x2c0 [ 97.931130] default_file_splice_read+0x421/0x7b0 [ 97.935971] ? __kmalloc+0x15d/0x7a0 [ 97.939674] ? alloc_pipe_info+0x15c/0x380 [ 97.943921] ? splice_direct_to_actor+0x5d2/0x7b0 [ 97.948802] ? do_splice_direct+0x18d/0x230 [ 97.953118] ? do_splice_direct+0x230/0x230 [ 97.957735] ? trace_hardirqs_on+0x10/0x10 [ 97.962154] ? save_trace+0x290/0x290 [ 97.965969] ? save_trace+0x290/0x290 [ 97.969775] ? __inode_security_revalidate+0xd6/0x130 [ 97.981687] ? avc_policy_seqno+0x9/0x20 [ 97.985749] ? selinux_file_permission+0x85/0x480 [ 97.990589] ? security_file_permission+0x89/0x1f0 [ 97.995521] ? rw_verify_area+0xea/0x2b0 [ 97.999583] ? do_splice_direct+0x230/0x230 [ 98.003893] do_splice_to+0x105/0x170 [ 98.007678] splice_direct_to_actor+0x222/0x7b0 [ 98.012333] ? generic_pipe_buf_nosteal+0x10/0x10 [ 98.017161] ? do_splice_to+0x170/0x170 [ 98.021123] ? rw_verify_area+0xea/0x2b0 [ 98.025175] do_splice_direct+0x18d/0x230 [ 98.029320] ? splice_direct_to_actor+0x7b0/0x7b0 [ 98.034152] ? rw_verify_area+0xea/0x2b0 [ 98.038221] do_sendfile+0x4db/0xbd0 [ 98.041935] ? do_compat_pwritev64+0x140/0x140 [ 98.046506] ? put_timespec64+0xb4/0x100 [ 98.050562] ? nsecs_to_jiffies+0x30/0x30 [ 98.054705] SyS_sendfile64+0x102/0x110 [ 98.058666] ? SyS_sendfile+0x130/0x130 [ 98.062625] ? do_syscall_64+0x53/0x640 [ 98.066585] ? SyS_sendfile+0x130/0x130 [ 98.070548] do_syscall_64+0x1e8/0x640 [ 98.074420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 98.079267] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 98.084449] RIP: 0033:0x459279 [ 98.087619] RSP: 002b:00007fdc28cf0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 98.095311] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 98.102564] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 98.109817] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 98.117072] R10: 0000000000008000 R11: 0000000000000246 R12: 00007fdc28cf16d4 [ 98.124341] R13: 00000000004c65f3 R14: 00000000004db268 R15: 00000000ffffffff [ 98.131797] Code: 06 00 00 e8 61 2e 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 98.151092] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff88806d04f478 [ 98.161787] ---[ end trace a3ed0509a21587cf ]--- [ 98.166647] Kernel panic - not syncing: Fatal exception [ 98.173096] Kernel Offset: disabled [ 98.176723] Rebooting in 86400 seconds..