[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 54.534031] random: sshd: uninitialized urandom read (32 bytes read) [ 54.786371] kauditd_printk_skb: 4 callbacks suppressed [ 54.786381] audit: type=1400 audit(1559772268.788:35): avc: denied { map } for pid=7085 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 54.843208] random: sshd: uninitialized urandom read (32 bytes read) [ 55.547818] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.1.3' (ECDSA) to the list of known hosts. [ 61.123582] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/05 22:04:35 fuzzer started [ 61.343801] audit: type=1400 audit(1559772275.348:36): avc: denied { map } for pid=7094 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 63.168445] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/05 22:04:37 dialing manager at 10.128.0.105:44623 2019/06/05 22:04:37 syscalls: 2444 2019/06/05 22:04:37 code coverage: enabled 2019/06/05 22:04:37 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/05 22:04:37 extra coverage: extra coverage is not supported by the kernel 2019/06/05 22:04:37 setuid sandbox: enabled 2019/06/05 22:04:37 namespace sandbox: enabled 2019/06/05 22:04:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/05 22:04:37 fault injection: enabled 2019/06/05 22:04:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/05 22:04:37 net packet injection: enabled 2019/06/05 22:04:37 net device setup: enabled [ 65.109295] random: crng init done 22:04:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0xa, 0x0, 0x0) close(0xffffffffffffffff) 22:04:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebffffffebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef08ccd9d94c50da520000008735e94726dfbe0189d9952cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c10000800000002cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e384500"/280, 0x118) 22:04:45 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032000000acc200000104000002000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae64af0e68fd043482c8"], 0x1) sendfile(r3, r4, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:04:45 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000004680)=[{{0x0, 0x0, 0x0}}], 0x4000000000000c7, 0x0, 0x0) close(r1) accept4(r0, 0x0, 0x0, 0x0) close(r1) 22:04:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) getdents64(r0, &(0x7f0000002400)=""/4096, 0xc8b7) 22:04:45 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000740)=@fragment, 0x8) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f0000000000)=0x34e) [ 71.908996] audit: type=1400 audit(1559772285.908:37): avc: denied { map } for pid=7094 comm="syz-fuzzer" path="/root/syzkaller-shm368362963" dev="sda1" ino=16487 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 71.944110] audit: type=1400 audit(1559772285.928:38): avc: denied { map } for pid=7112 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1125 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 72.880294] IPVS: ftp: loaded support on port[0] = 21 [ 73.141568] NET: Registered protocol family 30 [ 73.146193] Failed to register TIPC socket type [ 74.104911] IPVS: ftp: loaded support on port[0] = 21 [ 74.128096] NET: Registered protocol family 30 [ 74.172252] Failed to register TIPC socket type [ 74.273585] chnl_net:caif_netlink_parms(): no params data found [ 74.541307] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.578887] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.655600] device bridge_slave_0 entered promiscuous mode [ 74.788371] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.954744] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.022224] device bridge_slave_1 entered promiscuous mode [ 75.408634] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 75.717548] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 76.436040] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 76.600925] team0: Port device team_slave_0 added [ 76.812566] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 76.940475] team0: Port device team_slave_1 added [ 77.166678] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 77.414235] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 78.012900] device hsr_slave_0 entered promiscuous mode [ 78.052229] device hsr_slave_1 entered promiscuous mode [ 78.152415] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 78.295371] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 78.572313] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.202732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.472448] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.683344] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.689675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.721609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.926073] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 80.033198] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.232720] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 80.239877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 80.284862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 80.394573] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.401268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.566353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 80.693159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 80.703771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 80.840661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 80.919406] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.925915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.065874] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 81.171585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 81.291391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 81.298811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 81.493207] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 81.580972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 81.589089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 81.732702] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 81.739782] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 81.778991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 81.850756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 81.928160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 81.990289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 81.998067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.114765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 82.261543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 82.269653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.492365] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 82.498484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 82.764696] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 83.005253] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.594436] audit: type=1400 audit(1559772297.598:39): avc: denied { map } for pid=7712 comm="syz-executor.3" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=27710 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 83.700051] hrtimer: interrupt took 49250 ns [ 83.817032] kasan: CONFIG_KASAN_INLINE enabled [ 83.853011] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 83.906239] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 83.912568] Modules linked in: [ 83.915783] CPU: 1 PID: 7721 Comm: syz-executor.3 Not tainted 4.14.123 #17 [ 83.922810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.932197] task: ffff88808b31a600 task.stack: ffff8880961e0000 [ 83.938338] RIP: 0010:proto_seq_show+0x52/0x8c0 [ 83.943747] RSP: 0018:ffff8880961e7478 EFLAGS: 00010a06 [ 83.949655] RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90006e45000 [ 83.957317] RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 [ 83.964610] RBP: ffff8880961e7508 R08: ffff8880a0e90b88 R09: ffffed100d9f891c [ 83.971903] R10: ffffed100d9f891b R11: ffff88806cfc48dd R12: dffffc0000000000 [ 83.979277] R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3fe0 [ 83.986576] FS: 00007f92e4675700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 83.994950] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 84.000977] CR2: 00007f5c1734a1b0 CR3: 0000000083d5e000 CR4: 00000000001406e0 [ 84.008529] Call Trace: [ 84.011165] ? seq_list_next+0x1/0x80 [ 84.015511] ? seq_list_next+0x5e/0x80 [ 84.019424] seq_read+0xb46/0x1280 [ 84.023087] ? seq_lseek+0x3c0/0x3c0 [ 84.026827] proc_reg_read+0xfa/0x170 [ 84.030654] ? seq_lseek+0x3c0/0x3c0 [ 84.034392] do_iter_read+0x3e2/0x5b0 [ 84.038218] vfs_readv+0xd3/0x130 [ 84.041726] ? compat_rw_copy_check_uvector+0x310/0x310 [ 84.047321] ? iov_iter_get_pages_alloc+0xbc8/0xef0 [ 84.052388] default_file_splice_read+0x421/0x7b0 [ 84.057258] ? __kmalloc+0x15d/0x7a0 [ 84.061091] ? alloc_pipe_info+0x15c/0x380 [ 84.065344] ? splice_direct_to_actor+0x5d2/0x7b0 [ 84.070207] ? do_splice_direct+0x18d/0x230 [ 84.074550] ? do_splice_direct+0x230/0x230 [ 84.078912] ? trace_hardirqs_on+0x10/0x10 [ 84.083197] ? retint_kernel+0x2d/0x2d [ 84.087122] ? __inode_security_revalidate+0xd6/0x130 [ 84.092348] ? avc_policy_seqno+0x9/0x20 [ 84.096522] ? selinux_file_permission+0x85/0x480 [ 84.101504] ? security_file_permission+0x89/0x1f0 [ 84.106466] ? rw_verify_area+0xea/0x2b0 [ 84.110650] ? do_splice_direct+0x230/0x230 [ 84.115213] do_splice_to+0x105/0x170 [ 84.119046] splice_direct_to_actor+0x222/0x7b0 [ 84.123757] ? generic_pipe_buf_nosteal+0x10/0x10 [ 84.128635] ? do_splice_to+0x170/0x170 [ 84.132637] ? rw_verify_area+0xea/0x2b0 [ 84.136724] do_splice_direct+0x18d/0x230 [ 84.140895] ? splice_direct_to_actor+0x7b0/0x7b0 [ 84.145851] ? rw_verify_area+0xea/0x2b0 [ 84.149933] do_sendfile+0x4db/0xbd0 [ 84.153678] ? do_compat_pwritev64+0x140/0x140 [ 84.158284] ? put_timespec64+0xb4/0x100 [ 84.162389] ? nsecs_to_jiffies+0x30/0x30 [ 84.166570] SyS_sendfile64+0x102/0x110 [ 84.170676] ? SyS_sendfile+0x130/0x130 [ 84.174689] ? do_syscall_64+0x53/0x640 [ 84.178689] ? SyS_sendfile+0x130/0x130 [ 84.182686] do_syscall_64+0x1e8/0x640 [ 84.186707] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 84.191579] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 84.196814] RIP: 0033:0x459279 [ 84.200014] RSP: 002b:00007f92e4674c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 84.207758] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 84.215047] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 84.222423] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 84.229973] R10: 0000000000008000 R11: 0000000000000246 R12: 00007f92e46756d4 [ 84.237273] R13: 00000000004c65f3 R14: 00000000004db2a8 R15: 00000000ffffffff [ 84.244656] Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 [ 84.264481] RIP: proto_seq_show+0x52/0x8c0 RSP: ffff8880961e7478 [ 84.274610] ---[ end trace 95c0cfa0477a7d60 ]--- [ 84.279571] Kernel panic - not syncing: Fatal exception [ 84.286077] Kernel Offset: disabled [ 84.289829] Rebooting in 86400 seconds..