Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 40.952336] audit: type=1800 audit(1550109712.506:33): pid=7668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 44.011418] kauditd_printk_skb: 1 callbacks suppressed [ 44.011430] audit: type=1400 audit(1550109715.566:35): avc: denied { map } for pid=7845 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.178' (ECDSA) to the list of known hosts. [ 87.239166] audit: type=1400 audit(1550109758.796:36): avc: denied { map } for pid=7857 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/02/14 02:02:39 parsed 1 programs [ 87.991849] audit: type=1400 audit(1550109759.546:37): avc: denied { map } for pid=7857 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=66 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2019/02/14 02:02:41 executed programs: 0 [ 90.301663] IPVS: ftp: loaded support on port[0] = 21 [ 90.353004] chnl_net:caif_netlink_parms(): no params data found [ 90.379136] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.386073] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.393114] device bridge_slave_0 entered promiscuous mode [ 90.400390] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.406831] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.413607] device bridge_slave_1 entered promiscuous mode [ 90.427334] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 90.435932] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 90.450814] team0: Port device team_slave_0 added [ 90.456663] team0: Port device team_slave_1 added [ 90.528053] device hsr_slave_0 entered promiscuous mode [ 90.586375] device hsr_slave_1 entered promiscuous mode [ 90.633866] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.640401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.647377] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.653716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.681856] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.692566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.711884] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.719373] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.727407] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 90.737074] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.746265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.754208] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.760621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.769014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.776812] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.783258] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.798946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.806996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.814801] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.824268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.834098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.843203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.860482] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.870491] audit: type=1400 audit(1550109762.426:38): avc: denied { associate } for pid=7871 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 90.913521] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 2019/02/14 02:02:46 executed programs: 75 2019/02/14 02:02:51 executed programs: 155 [ 104.430191] kasan: CONFIG_KASAN_INLINE enabled [ 104.435640] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 104.443390] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 104.449615] CPU: 0 PID: 8757 Comm: syz-executor.0 Not tainted 5.0.0-rc6+ #70 [ 104.456779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.466122] RIP: 0010:__dentry_path+0x49e/0x7c0 [ 104.470801] Code: 89 fc 41 83 e4 01 44 89 e6 e8 6e e7 b2 ff 45 84 e4 0f 85 04 02 00 00 e8 20 e6 b2 ff 48 8b 85 18 ff ff ff 44 89 bd 40 ff ff ff <80> 38 00 0f 85 f9 02 00 00 48 8b 85 38 ff ff ff 41 83 e7 01 44 89 [ 104.489693] RSP: 0018:ffff88809369fad0 EFLAGS: 00010293 [ 104.495031] RAX: dffffc0000000005 RBX: 0000000000000000 RCX: ffffffff81bcfaf2 [ 104.502279] RDX: 0000000000000000 RSI: ffffffff81bcfb00 RDI: 0000000000000001 [ 104.509525] RBP: ffff88809369fbc0 R08: ffff88809e5ec040 R09: 0000000000000000 [ 104.516772] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 104.524016] R13: ffff88809369fb98 R14: ffff888093a3d17e R15: 00000000000022fe [ 104.531267] FS: 00007f693e058700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 104.539495] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 104.545364] CR2: 00007fc68ccf7000 CR3: 00000000933a8000 CR4: 00000000001426f0 [ 104.552617] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 104.559887] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 104.567146] Call Trace: [ 104.569734] ? simple_dname+0x1f0/0x1f0 [ 104.573692] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 104.579222] ? kmem_cache_alloc_trace+0x354/0x760 [ 104.584045] dentry_path_raw+0x26/0x30 [ 104.587917] kvm_uevent_notify_change.part.0+0x213/0x440 [ 104.593345] kvm_dev_ioctl+0x1132/0x1750 [ 104.597392] ? kvm_debugfs_release+0x90/0x90 [ 104.601783] ? __might_sleep+0x95/0x190 [ 104.605735] ? kvm_debugfs_release+0x90/0x90 [ 104.610123] do_vfs_ioctl+0xd6e/0x1390 [ 104.613991] ? selinux_file_ioctl+0x46f/0x5e0 [ 104.618470] ? selinux_file_ioctl+0x125/0x5e0 [ 104.622956] ? ioctl_preallocate+0x210/0x210 [ 104.627339] ? selinux_file_mprotect+0x620/0x620 [ 104.632180] ? iterate_fd+0x360/0x360 [ 104.635963] ? nsecs_to_jiffies+0x30/0x30 [ 104.640103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.645616] ? security_file_ioctl+0x93/0xc0 [ 104.650100] ksys_ioctl+0xab/0xd0 [ 104.653533] __x64_sys_ioctl+0x73/0xb0 [ 104.657414] do_syscall_64+0x103/0x610 [ 104.661477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.666642] RIP: 0033:0x457e29 [ 104.669814] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 104.688787] RSP: 002b:00007f693e057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 104.697025] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 104.704283] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000007 [ 104.711535] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 104.718783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f693e0586d4 [ 104.726028] R13: 00000000004c093b R14: 00000000004d26b0 R15: 00000000ffffffff [ 104.733296] Modules linked in: [ 104.737260] ---[ end trace 43d5612e3293234a ]--- [ 104.742096] RIP: 0010:__dentry_path+0x49e/0x7c0 [ 104.746843] Code: 89 fc 41 83 e4 01 44 89 e6 e8 6e e7 b2 ff 45 84 e4 0f 85 04 02 00 00 e8 20 e6 b2 ff 48 8b 85 18 ff ff ff 44 89 bd 40 ff ff ff <80> 38 00 0f 85 f9 02 00 00 48 8b 85 38 ff ff ff 41 83 e7 01 44 89 [ 104.766307] RSP: 0018:ffff88809369fad0 EFLAGS: 00010293 [ 104.771724] RAX: dffffc0000000005 RBX: 0000000000000000 RCX: ffffffff81bcfaf2 [ 104.779517] RDX: 0000000000000000 RSI: ffffffff81bcfb00 RDI: 0000000000000001 [ 104.787257] RBP: ffff88809369fbc0 R08: ffff88809e5ec040 R09: 0000000000000000 [ 104.794531] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 104.796236] kobject: 'kvm' (000000004db40040): kobject_uevent_env [ 104.802013] R13: ffff88809369fb98 R14: ffff888093a3d17e R15: 00000000000022fe [ 104.808097] kobject: 'kvm' (000000004db40040): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 104.815642] FS: 00007f693e058700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 104.833651] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 104.839601] CR2: 00007fc68ccf7000 CR3: 00000000933a8000 CR4: 00000000001426f0 [ 104.846908] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 104.854265] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 104.861541] Kernel panic - not syncing: Fatal exception [ 104.868241] Kernel Offset: disabled [ 104.871857] Rebooting in 86400 seconds..