[ 40.149692] audit: type=1800 audit(1558845213.299:30): pid=7640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 45.253223] kauditd_printk_skb: 4 callbacks suppressed [ 45.253238] audit: type=1400 audit(1558845218.449:35): avc: denied { map } for pid=7817 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.10' (ECDSA) to the list of known hosts. 2019/05/26 04:33:45 fuzzer started [ 52.099078] audit: type=1400 audit(1558845225.299:36): avc: denied { map } for pid=7826 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/05/26 04:33:47 dialing manager at 10.128.0.105:44295 2019/05/26 04:33:48 syscalls: 2457 2019/05/26 04:33:48 code coverage: enabled 2019/05/26 04:33:48 comparison tracing: enabled 2019/05/26 04:33:48 extra coverage: extra coverage is not supported by the kernel 2019/05/26 04:33:48 setuid sandbox: enabled 2019/05/26 04:33:48 namespace sandbox: enabled 2019/05/26 04:33:48 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/26 04:33:48 fault injection: enabled 2019/05/26 04:33:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/26 04:33:48 net packet injection: enabled 2019/05/26 04:33:48 net device setup: enabled 04:33:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x40}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 61.756344] audit: type=1400 audit(1558845234.959:37): avc: denied { map } for pid=7844 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=4095 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 61.889673] IPVS: ftp: loaded support on port[0] = 21 [ 61.901688] NET: Registered protocol family 30 [ 61.906582] Failed to register TIPC socket type 04:33:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000180)={{}, {}, [], {0x4, 0x4}, [{0x8, 0x5}, {0x8, 0x4}], {0x10, 0x2}, {0x20, 0x2}}, 0x34, 0x1) [ 62.134939] IPVS: ftp: loaded support on port[0] = 21 [ 62.144229] NET: Registered protocol family 30 [ 62.175236] Failed to register TIPC socket type 04:33:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_int(r1, 0x29, 0x200000000000018, 0x0, 0x51) [ 62.403037] IPVS: ftp: loaded support on port[0] = 21 [ 62.429092] NET: Registered protocol family 30 [ 62.433701] Failed to register TIPC socket type 04:33:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000000000d0000002400040014000700080004000000000008000400000000000c00010073797a3100000000500004000c00010073797a30000000001400010062726f6164636173742d6c696e6b000014000700080004000000000008000300000000000c00010073797a31000000000c00070008000200000000001400020008000100000000000800010000000000"], 0x1}}, 0x0) syz_execute_func(&(0x7f0000000280)="f2af91930f0124eda133fa20430fbafce842f66188d027430fc7f314c1ab5bf9e2f9660f3a0fae735e090000baba3c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa11420f383c020201405c6bfd49d768d768f833fefbab6464660f38323c8f4481e5eb85ee00003aa1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 62.942031] IPVS: ftp: loaded support on port[0] = 21 [ 62.960064] NET: Registered protocol family 30 [ 62.964672] Failed to register TIPC socket type 04:33:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f00000004c0)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x105}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") r1 = socket$inet6(0xa, 0x401000000801, 0x0) close(r1) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 63.450486] IPVS: ftp: loaded support on port[0] = 21 [ 63.479079] NET: Registered protocol family 30 [ 63.484391] Failed to register TIPC socket type 04:33:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xc, 0x0, &(0x7f0000000040)) [ 64.100616] IPVS: ftp: loaded support on port[0] = 21 [ 64.139152] NET: Registered protocol family 30 [ 64.143777] Failed to register TIPC socket type [ 64.946976] chnl_net:caif_netlink_parms(): no params data found [ 65.383728] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.476049] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.542441] device bridge_slave_0 entered promiscuous mode [ 65.620345] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.696047] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.815947] device bridge_slave_1 entered promiscuous mode [ 66.272260] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.582651] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 67.127280] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 67.279030] team0: Port device team_slave_0 added [ 67.557361] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 67.691726] team0: Port device team_slave_1 added [ 68.005354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 68.191350] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 68.732473] device hsr_slave_0 entered promiscuous mode [ 68.919229] device hsr_slave_1 entered promiscuous mode [ 69.090379] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 69.199261] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 69.460306] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 70.080903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.311359] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 70.488816] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 70.545127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.553411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.697807] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 70.703946] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.957427] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.964510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.996792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.094596] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.101173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.259066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.367467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.374785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.456500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.516175] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.522565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.629018] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 71.706199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.776495] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 71.783479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.961462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 72.017246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.025727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.117046] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.189807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 72.225733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.258618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.314778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 72.415847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.423976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.519584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 72.590540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.600679] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.684671] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 72.779258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.871210] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 72.994488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.199388] audit: type=1400 audit(1558845246.399:38): avc: denied { associate } for pid=7845 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 04:34:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="02080000bf010000000000000000000042470000086e000021232948de042774602f36cde77a"], 0x26}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f3b7c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 04:34:12 executing program 0: r0 = socket(0x1e, 0x5, 0x0) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x8) connect$tipc(r0, &(0x7f0000000000)=@name, 0x10) close(r0) close(r1) [ 79.604190] IPVS: ftp: loaded support on port[0] = 21 [ 79.679056] NET: Registered protocol family 30 [ 79.683688] Failed to register TIPC socket type [ 79.742742] IPVS: ftp: loaded support on port[0] = 21 [ 79.763925] NET: Registered protocol family 30 [ 79.768446] IPVS: ftp: loaded support on port[0] = 21 [ 79.770789] IPVS: ftp: loaded support on port[0] = 21 [ 79.776310] IPVS: ftp: loaded support on port[0] = 21 [ 79.794961] Failed to register TIPC socket type [ 79.802754] list_add double add: new=ffffffff892e71b0, prev=ffffffff890f2d80, next=ffffffff892e71b0. [ 79.826143] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 79.834094] WARNING: CPU: 1 PID: 18 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 79.841889] Kernel panic - not syncing: panic_on_warn set ... [ 79.841889] [ 79.849254] CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 4.19.46 #18 [ 79.855742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.865088] Call Trace: [ 79.867685] dump_stack+0x172/0x1f0 [ 79.871323] panic+0x263/0x507 [ 79.874519] ? __warn_printk+0xf3/0xf3 [ 79.878416] ? kmem_cache_free.cold+0x1c/0x23 [ 79.882911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 79.888452] ? __warn.cold+0x5/0x4a [ 79.892077] ? __warn+0xe8/0x1d0 [ 79.895446] ? kmem_cache_free.cold+0x1c/0x23 [ 79.899946] __warn.cold+0x20/0x4a [ 79.903486] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 79.908069] ? kmem_cache_free.cold+0x1c/0x23 [ 79.912571] report_bug+0x263/0x2b0 [ 79.916201] do_error_trap+0x204/0x360 [ 79.920090] ? math_error+0x340/0x340 [ 79.923900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 79.929438] ? wake_up_klogd+0x99/0xd0 [ 79.933328] ? error_entry+0x76/0xd0 [ 79.937047] ? trace_hardirqs_off_caller+0x65/0x220 [ 79.942070] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 79.946922] do_invalid_op+0x1b/0x20 [ 79.950634] invalid_op+0x14/0x20 [ 79.954088] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 79.959210] Code: e8 25 8d 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 40 45 54 87 48 c7 c7 18 64 38 88 49 8b 54 24 58 e8 34 43 b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 40 45 54 87 48 c7 c7 18 [ 79.978115] RSP: 0018:ffff8880aa2a7ba8 EFLAGS: 00010286 [ 79.983482] RAX: 0000000000000046 RBX: ffff8880a8588240 RCX: 0000000000000000 [ 79.990751] RDX: 0000000000000000 RSI: ffffffff81559e76 RDI: ffffed1015454f67 [ 79.998028] RBP: ffff8880aa2a7bc8 R08: 0000000000000046 R09: ffffed1015d24fe9 [ 80.005307] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffff8880a89e6000 [ 80.012614] R13: 0000000000000000 R14: ffff8880a89e6000 R15: ffff8880a8588550 [ 80.019925] ? vprintk_func+0x86/0x189 [ 80.023874] ? kmem_cache_free.cold+0x1c/0x23 [ 80.028393] __sk_destruct+0x4b4/0x6d0 [ 80.032304] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 80.037679] sk_destruct+0x7b/0x90 [ 80.041228] __sk_free+0xce/0x300 [ 80.044695] sk_free+0x42/0x50 [ 80.047909] tipc_sk_callback+0x48/0x60 [ 80.051904] rcu_process_callbacks+0xba0/0x1a30 [ 80.056591] ? __rcu_read_unlock+0x170/0x170 [ 80.061009] ? sched_clock+0x2e/0x50 [ 80.064744] __do_softirq+0x25c/0x921 [ 80.068558] ? pci_mmcfg_check_reserved+0x170/0x170 04:34:13 executing program 0: r0 = socket(0x1e, 0x5, 0x0) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x8) connect$tipc(r0, &(0x7f0000000000)=@name, 0x10) close(r0) close(r1) [ 80.073598] ? takeover_tasklets+0x7b0/0x7b0 [ 80.078018] run_ksoftirqd+0x8e/0x110 [ 80.081822] smpboot_thread_fn+0x6a3/0xa30 [ 80.086075] ? sort_range+0x30/0x30 [ 80.089716] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 80.095262] ? __kthread_parkme+0xfb/0x1b0 [ 80.099508] kthread+0x354/0x420 [ 80.102897] ? sort_range+0x30/0x30 [ 80.106533] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 80.111988] ret_from_fork+0x24/0x30 [ 80.116869] Kernel Offset: disabled [ 80.120556] Rebooting in 86400 seconds..