syzkaller login: [ 51.039113] audit: type=1400 audit(1559576701.033:35): avc: denied { map } for pid=7604 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.11' (ECDSA) to the list of known hosts. 2019/06/03 15:45:07 fuzzer started [ 57.672400] audit: type=1400 audit(1559576707.663:36): avc: denied { map } for pid=7613 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/03 15:45:10 dialing manager at 10.128.0.105:46883 2019/06/03 15:45:10 syscalls: 2456 2019/06/03 15:45:10 code coverage: enabled 2019/06/03 15:45:10 comparison tracing: enabled 2019/06/03 15:45:10 extra coverage: extra coverage is not supported by the kernel 2019/06/03 15:45:10 setuid sandbox: enabled 2019/06/03 15:45:10 namespace sandbox: enabled 2019/06/03 15:45:10 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/03 15:45:10 fault injection: enabled 2019/06/03 15:45:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/03 15:45:10 net packet injection: enabled 2019/06/03 15:45:10 net device setup: enabled 15:45:13 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/203, 0xcb}], 0x1}, 0x0) shutdown(r0, 0x2) [ 63.064725] audit: type=1400 audit(1559576713.053:37): avc: denied { map } for pid=7632 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=79 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 63.150659] IPVS: ftp: loaded support on port[0] = 21 [ 63.160284] NET: Registered protocol family 30 [ 63.164923] Failed to register TIPC socket type 15:45:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f0000000540)='nfsd\x00', 0x0, 0x0) [ 63.472117] IPVS: ftp: loaded support on port[0] = 21 [ 63.489684] NET: Registered protocol family 30 [ 63.494333] Failed to register TIPC socket type 15:45:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) keyctl$chown(0x4, 0x0, r1, r2) [ 63.770543] IPVS: ftp: loaded support on port[0] = 21 [ 63.791092] NET: Registered protocol family 30 [ 63.805387] Failed to register TIPC socket type 15:45:14 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @icmp=@address_request={0x16, 0x0, 0x0, 0xe0000002}}}}}, 0x0) [ 64.267780] IPVS: ftp: loaded support on port[0] = 21 [ 64.287468] NET: Registered protocol family 30 [ 64.292100] Failed to register TIPC socket type 15:45:14 executing program 4: clone(0x14180100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 64.970581] IPVS: ftp: loaded support on port[0] = 21 [ 65.019329] NET: Registered protocol family 30 [ 65.023970] Failed to register TIPC socket type 15:45:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r1) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f0000002700)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local, 0xd}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)='\x00', 0x1}], 0x1}, 0x45) setsockopt$sock_attach_bpf(r1, 0x1, 0xd, &(0x7f0000000080), 0x2cb) r3 = socket$kcm(0xa, 0x1000000000000001, 0x0) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, 0x1}, 0x80, 0x0}, 0x20008844) r4 = getpid() perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7ff, 0x101, 0x9, 0x1, 0x0, 0x7, 0x204, 0x0, 0x3, 0x6, 0x2715, 0x2, 0x101, 0x5, 0x31e6, 0x3, 0x80000, 0x40, 0x1, 0xfffffffffffffffe, 0x0, 0x0, 0x101, 0x3f, 0x8, 0x8001, 0x80, 0x8, 0x3, 0xfbf, 0x82d, 0x3, 0x8, 0x4, 0x40, 0x9, 0x0, 0x4c4, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x80, 0x3, 0x0, 0x0, 0x5, 0x2, 0x9bb9}, r4, 0x10, r0, 0xa) r5 = perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffff9, 0x3, 0x0, 0x0, 0x80100, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7, 0x8, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffff7f, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x2, 0x4, 0x0, 0x2, 0x5, 0x0, 0x5f1, 0x0, 0xffffffffffffff6b, 0x4, @perf_config_ext={0x40, 0x5}, 0x0, 0x0, 0x4, 0x4, 0x21c, 0x0, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x0, 0x9286, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffc1, 0x64}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280), 0x4) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x2) perf_event_open$cgroup(&(0x7f0000000300)={0x2, 0x70, 0x9, 0x6, 0x13, 0x80000001, 0x0, 0xffff, 0x0, 0x4, 0x3, 0x7, 0x1000, 0x100, 0x81, 0x6, 0x81, 0x4, 0x39, 0x6, 0x7, 0x2, 0x80000001, 0x100, 0x60, 0x40, 0x12ca, 0x1, 0x2, 0x5, 0x5, 0x8001, 0x7, 0x5b, 0x7, 0x7b, 0x20, 0x10000, 0x0, 0xbfb, 0x6, @perf_bp={&(0x7f0000000100)}, 0x4000, 0x6, 0x8, 0xd, 0xffffffff, 0x7fffffff, 0x8}, r7, 0x0, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f00000004c0)={0x1, 0x70, 0xf2c, 0x10000, 0x2, 0x4, 0x0, 0xfffffffffffffffc, 0x2000, 0x6, 0x4, 0x1ff, 0x7f0b, 0x80000001, 0x7, 0x8, 0x400, 0x4, 0x7ff, 0x100000001, 0x2, 0x6da, 0xffff, 0x6, 0x1, 0x80000001, 0x80000000, 0x9, 0xab, 0x3, 0xcd73, 0xffffffffffff0001, 0x737e, 0x4, 0x6, 0x8, 0x8, 0x40, 0x0, 0x3e6, 0x2, @perf_bp={&(0x7f0000000380), 0x5}, 0x18800, 0x81, 0x2000000000, 0x7, 0x3, 0x0, 0x41}) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x200}) recvmsg(0xffffffffffffffff, 0x0, 0x40) [ 65.560706] chnl_net:caif_netlink_parms(): no params data found [ 65.920020] IPVS: ftp: loaded support on port[0] = 21 [ 65.928181] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.956343] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.980576] NET: Registered protocol family 30 [ 65.985223] Failed to register TIPC socket type [ 66.016301] device bridge_slave_0 entered promiscuous mode [ 66.066255] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.157154] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.317272] device bridge_slave_1 entered promiscuous mode [ 66.760063] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 67.094008] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 67.687197] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 67.857002] team0: Port device team_slave_0 added [ 68.060395] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 68.197170] team0: Port device team_slave_1 added [ 68.541872] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 68.740317] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 69.793586] device hsr_slave_0 entered promiscuous mode [ 70.108371] device hsr_slave_1 entered promiscuous mode [ 70.353420] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 70.547330] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 70.876820] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 71.688643] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.785235] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.149089] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.265540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.273566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.422581] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 72.526218] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.746207] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.856417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.864475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.005843] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.012425] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.177919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.338599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.386035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.485764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.596560] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.602978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.741990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.872066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.977512] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.984734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.167597] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.174530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.175616] IPVS: ftp: loaded support on port[0] = 21 [ 74.216179] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.257011] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 74.275178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.361420] NET: Registered protocol family 30 [ 74.441371] Failed to register TIPC socket type [ 74.475522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.483712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.601766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 74.705521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 74.713262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.834343] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 74.941439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 74.950081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.066233] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 75.072351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 75.298288] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 75.508300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.647614] audit: type=1400 audit(1559576725.643:38): avc: denied { associate } for pid=7633 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 15:45:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/203, 0xcb}], 0x1}, 0x0) shutdown(r0, 0x2) 15:45:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/203, 0xcb}], 0x1}, 0x0) shutdown(r0, 0x2) [ 76.790891] IPVS: ftp: loaded support on port[0] = 21 15:45:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/203, 0xcb}], 0x1}, 0x0) shutdown(r0, 0x2) [ 76.840058] NET: Registered protocol family 30 [ 76.845045] Failed to register TIPC socket type [ 76.885781] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 76.893878] WARNING: CPU: 0 PID: 9 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 76.901603] Kernel panic - not syncing: panic_on_warn set ... [ 76.901603] [ 76.908980] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 4.19.47 #19 [ 76.915389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.924743] Call Trace: [ 76.927340] dump_stack+0x172/0x1f0 [ 76.930966] panic+0x263/0x507 [ 76.934153] ? __warn_printk+0xf3/0xf3 [ 76.938041] ? kmem_cache_free.cold+0x1c/0x23 [ 76.942550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 76.948098] ? __warn.cold+0x5/0x4a [ 76.951720] ? __warn+0xe8/0x1d0 [ 76.955080] ? kmem_cache_free.cold+0x1c/0x23 [ 76.959575] __warn.cold+0x20/0x4a [ 76.963136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 76.968672] ? kmem_cache_free.cold+0x1c/0x23 [ 76.973192] report_bug+0x263/0x2b0 [ 76.976822] do_error_trap+0x204/0x360 [ 76.980707] ? math_error+0x340/0x340 [ 76.984527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 76.990065] ? wake_up_klogd+0x99/0xd0 [ 76.993960] ? error_entry+0x76/0xd0 [ 76.997673] ? trace_hardirqs_off_caller+0x65/0x220 [ 77.002695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 77.007538] do_invalid_op+0x1b/0x20 [ 77.011267] invalid_op+0x14/0x20 [ 77.014729] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 77.019830] Code: e8 95 ab 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 66 38 88 49 8b 54 24 58 e8 44 3d b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 [ 77.038724] RSP: 0018:ffff8880aa237ba8 EFLAGS: 00010286 [ 77.044097] RAX: 0000000000000046 RBX: ffff888089012880 RCX: 0000000000000000 [ 77.051366] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed1015446f67 [ 77.058822] RBP: ffff8880aa237bc8 R08: 0000000000000046 R09: ffffed1015d04fe9 [ 77.066090] R10: ffffed1015d04fe8 R11: ffff8880ae827f47 R12: ffff88808bcb8c40 [ 77.073357] R13: 0000000000000000 R14: ffff88808bcb8c40 R15: ffff888089012b90 [ 77.080660] ? vprintk_func+0x86/0x189 [ 77.084571] ? kmem_cache_free.cold+0x1c/0x23 [ 77.089074] __sk_destruct+0x4b4/0x6d0 [ 77.092969] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 77.098336] sk_destruct+0x7b/0x90 [ 77.101877] __sk_free+0xce/0x300 [ 77.105374] sk_free+0x42/0x50 [ 77.108567] tipc_sk_callback+0x48/0x60 [ 77.112540] rcu_process_callbacks+0xba0/0x1a30 [ 77.117219] ? __rcu_read_unlock+0x170/0x170 [ 77.121649] ? sched_clock+0x2e/0x50 [ 77.125373] __do_softirq+0x25c/0x921 [ 77.129169] ? pci_mmcfg_check_reserved+0x170/0x170 [ 77.134194] ? takeover_tasklets+0x7b0/0x7b0 [ 77.138597] run_ksoftirqd+0x8e/0x110 [ 77.142394] smpboot_thread_fn+0x6a3/0xa30 [ 77.146640] ? sort_range+0x30/0x30 [ 77.150264] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 77.156058] ? __kthread_parkme+0xfb/0x1b0 [ 77.160286] kthread+0x354/0x420 [ 77.163646] ? sort_range+0x30/0x30 [ 77.167265] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 77.172714] ret_from_fork+0x24/0x30 [ 77.177959] Kernel Offset: disabled [ 77.181670] Rebooting in 86400 seconds..