syzkaller login: [ 45.956153][ T24] audit: type=1400 audit(1562048909.233:35): avc: denied { map } for pid=6980 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.147' (ECDSA) to the list of known hosts. [ 51.933211][ T24] audit: type=1400 audit(1562048915.203:36): avc: denied { map } for pid=6992 comm="syz-executor763" path="/root/syz-executor763610244" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 58.731342][ T6992] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) executing program [ 58.779252][ T6993] IPVS: ftp: loaded support on port[0] = 21 [ 58.794368][ T6993] FAULT_INJECTION: forcing a failure. [ 58.794368][ T6993] name failslab, interval 1, probability 0, space 0, times 1 [ 58.807323][ T6993] CPU: 1 PID: 6993 Comm: syz-executor763 Not tainted 5.2.0-rc7 #48 [ 58.815259][ T6993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.826013][ T6993] Call Trace: [ 58.829284][ T6993] dump_stack+0xaa/0xd6 [ 58.833520][ T6993] should_fail.cold+0x3c/0x49 [ 58.838305][ T6993] __should_failslab+0x65/0xa0 [ 58.843151][ T6993] should_failslab+0x9/0x14 [ 58.847825][ T6993] kmem_cache_alloc+0x26/0x270 [ 58.852714][ T6993] ? kstrdup+0x5a/0x70 [ 58.856971][ T6993] __kernfs_new_node+0x75/0x270 [ 58.862228][ T6993] ? map_id_range_down+0xb4/0x140 [ 58.867238][ T6993] ? make_kgid+0x23/0x30 [ 58.871727][ T6993] kernfs_new_node+0x5e/0x90 [ 58.876399][ T6993] kernfs_create_dir_ns+0x52/0xb0 [ 58.881591][ T6993] sysfs_create_dir_ns+0x8a/0x120 [ 58.886599][ T6993] kobject_add_internal+0x103/0x350 [ 58.891780][ T6993] ? _raw_write_unlock_irqrestore+0x25/0x40 [ 58.897667][ T6993] kobject_add+0x9e/0xe0 [ 58.902136][ T6993] ? _raw_spin_unlock+0x1f/0x40 [ 58.907116][ T6993] ? get_device_parent.isra.0+0x108/0x240 [ 58.912927][ T6993] device_add+0x19d/0x890 [ 58.917241][ T6993] netdev_register_kobject+0xa6/0x1b0 [ 58.922606][ T6993] register_netdevice+0x397/0x600 [ 58.927835][ T6993] bond_newlink+0x41/0x80 [ 58.932244][ T6993] ? bond_changelink+0xba0/0xba0 [ 58.937159][ T6993] __rtnl_newlink+0x892/0xb30 [ 58.941828][ T6993] ? is_bpf_text_address+0x24/0x30 [ 58.946932][ T6993] ? tomoyo_merge_path_acl+0x39/0x60 [ 58.952376][ T6993] ? tomoyo_same_path_acl+0x60/0x60 [ 58.957746][ T6993] ? tomoyo_update_domain+0x9f/0x1f0 [ 58.963019][ T6993] ? debug_smp_processor_id+0x2c/0x120 [ 58.968468][ T6993] ? rcu_is_watching+0x11/0x50 [ 58.973323][ T6993] ? call_rcu+0xb/0x10 [ 58.977485][ T6993] ? put_object+0x20/0x30 [ 58.981792][ T6993] ? __delete_object+0x39/0x50 [ 58.986703][ T6993] ? delete_object_full+0x18/0x20 [ 58.991712][ T6993] ? bpf_prog_kallsyms_find+0x39/0x140 [ 58.997239][ T6993] ? __rtnl_newlink+0xb30/0xb30 [ 59.002282][ T6993] rtnl_newlink+0x4e/0x80 [ 59.006584][ T6993] rtnetlink_rcv_msg+0x178/0x4b0 [ 59.011805][ T6993] ? netlink_compare+0x44/0x50 [ 59.016550][ T6993] ? rtnl_calcit.isra.0+0x170/0x170 [ 59.021731][ T6993] netlink_rcv_skb+0x61/0x170 [ 59.026523][ T6993] rtnetlink_rcv+0x1d/0x30 [ 59.030922][ T6993] netlink_unicast+0x1ec/0x2d0 [ 59.035664][ T6993] netlink_sendmsg+0x26a/0x480 [ 59.040545][ T6993] sock_sendmsg+0x54/0x70 [ 59.044874][ T6993] ___sys_sendmsg+0x393/0x3c0 [ 59.049539][ T6993] ? _parse_integer+0xbf/0xe0 [ 59.054422][ T6993] ? _kstrtoull+0x92/0xd0 [ 59.058747][ T6993] ? kstrtouint+0x76/0xa0 [ 59.063159][ T6993] ? kstrtouint_from_user+0x7f/0xb0 [ 59.068583][ T6993] ? selinux_file_permission+0x30/0x1f0 [ 59.074221][ T6993] ? __fget_light+0x70/0xb0 [ 59.078808][ T6993] ? __fdget+0x1b/0x20 [ 59.082859][ T6993] ? sockfd_lookup_light+0x6c/0xb0 [ 59.088058][ T6993] __sys_sendmsg+0x80/0xf0 [ 59.092546][ T6993] __x64_sys_sendmsg+0x23/0x30 [ 59.097290][ T6993] do_syscall_64+0x76/0x1a0 [ 59.101928][ T6993] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.108014][ T6993] RIP: 0033:0x4417b9 [ 59.112034][ T6993] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b 0e fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 59.132077][ T6993] RSP: 002b:00007ffe5e9dff58 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 59.140608][ T6993] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004417b9 [ 59.148888][ T6993] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 59.157066][ T6993] RBP: 00007ffe5e9dffc0 R08: 0000000000000002 R09: 00000000bb1414ac [ 59.165280][ T6993] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 59.173696][ T6993] R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000 [ 59.182130][ T6993] kobject_add_internal failed for bond0 (error: -12 parent: net) [ 59.190541][ T6993] bond0 (uninitialized): Released all slaves [ 65.112889][ T6992] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881189e20a0 (size 32): comm "syz-executor763", pid 6993, jiffies 4294943151 (age 8.350s) hex dump (first 32 bytes): 62 6f 6e 64 30 00 00 00 00 00 00 00 00 00 00 00 bond0........... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000856cc2c7>] __kmalloc_track_caller+0x15d/0x2c0 [<00000000d3ea9156>] kstrdup+0x3a/0x70 [<00000000b8644a57>] kstrdup_const+0x48/0x60 [<00000000335051c2>] kvasprintf_const+0x7e/0xe0 [<000000002b24d8b6>] kobject_set_name_vargs+0x40/0xe0 [<00000000b6a73548>] dev_set_name+0x63/0x90 [<000000003ffaab43>] netdev_register_kobject+0x5a/0x1b0 [<000000006fa8690c>] register_netdevice+0x397/0x600 [<00000000d91c4b17>] bond_newlink+0x41/0x80 [<00000000b811933f>] __rtnl_newlink+0x892/0xb30 [<00000000b75b8ba8>] rtnl_newlink+0x4e/0x80 [<00000000b2551c97>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000003ef80388>] netlink_rcv_skb+0x61/0x170 [<000000000e4a4779>] rtnetlink_rcv+0x1d/0x30 [<000000007e424066>] netlink_unicast+0x1ec/0x2d0 [<0000000025d14354>] netlink_sendmsg+0x26a/0x480