Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 8.732580][ T22] audit: type=1400 audit(1583587004.989:10): avc: denied { watch } for pid=1786 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 8.741039][ T22] audit: type=1400 audit(1583587004.999:11): avc: denied { watch } for pid=1786 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2280 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 12.234391][ T22] audit: type=1400 audit(1583587008.489:12): avc: denied { map } for pid=1859 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.77' (ECDSA) to the list of known hosts. [ 22.880799][ T22] audit: type=1400 audit(1583587019.139:13): avc: denied { map } for pid=1877 comm="syz-executor869" path="/root/syz-executor869189757" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 22.890552][ T1884] cgroup1: Unknown subsys name 'perf_event' [ 22.892816][ T1888] cgroup1: Unknown subsys name 'perf_event' [ 22.893049][ T1884] cgroup1: Unknown subsys name 'net_cls' [ 22.894236][ T1888] cgroup1: Unknown subsys name 'net_cls' [ 22.900889][ T1889] cgroup1: Unknown subsys name 'perf_event' [ 22.901311][ T1885] cgroup1: Unknown subsys name 'perf_event' [ 22.906997][ T1889] cgroup1: Unknown subsys name 'net_cls' [ 22.913297][ T1886] cgroup1: Unknown subsys name 'perf_event' [ 22.925109][ T1887] cgroup1: Unknown subsys name 'perf_event' executing program executing program [ 22.931325][ T1887] cgroup1: Unknown subsys name 'net_cls' [ 22.940029][ T1886] cgroup1: Unknown subsys name 'net_cls' [ 22.947025][ T1885] cgroup1: Unknown subsys name 'net_cls' [ 22.947628][ T22] audit: type=1400 audit(1583587019.199:14): avc: denied { associate } for pid=1889 comm="syz-executor869" name="syz5" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 24.500068][ T1982] ================================================================== [ 24.508171][ T1982] BUG: KASAN: use-after-free in free_netdev+0x186/0x300 [ 24.515084][ T1982] Read of size 8 at addr ffff8881ce7b04f0 by task syz-executor869/1982 [ 24.523288][ T1982] [ 24.525594][ T1982] CPU: 0 PID: 1982 Comm: syz-executor869 Not tainted 5.4.24-syzkaller-00181-g3334f0da669e #0 [ 24.535710][ T1982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 24.545739][ T1982] Call Trace: [ 24.549021][ T1982] dump_stack+0x1b0/0x228 [ 24.553337][ T1982] ? show_regs_print_info+0x18/0x18 [ 24.558519][ T1982] ? vprintk_func+0x105/0x110 [ 24.563168][ T1982] ? printk+0xc0/0x109 [ 24.567209][ T1982] print_address_description+0x96/0x5d0 [ 24.572729][ T1982] ? devkmsg_release+0x127/0x127 [ 24.577641][ T1982] ? call_rcu+0x10/0x10 [ 24.581786][ T1982] __kasan_report+0x14b/0x1c0 [ 24.586443][ T1982] ? free_netdev+0x186/0x300 [ 24.591018][ T1982] kasan_report+0x26/0x50 [ 24.595333][ T1982] __asan_report_load8_noabort+0x14/0x20 [ 24.600938][ T1982] free_netdev+0x186/0x300 [ 24.605337][ T1982] netdev_run_todo+0xbc4/0xe00 [ 24.610076][ T1982] ? netdev_refcnt_read+0x1c0/0x1c0 [ 24.615246][ T1982] ? mutex_trylock+0xb0/0xb0 [ 24.619811][ T1982] ? netlink_net_capable+0x124/0x160 [ 24.625086][ T1982] rtnetlink_rcv_msg+0x963/0xc20 [ 24.629997][ T1982] ? is_bpf_text_address+0x2c8/0x2e0 [ 24.635258][ T1982] ? __kernel_text_address+0x9a/0x110 [ 24.640621][ T1982] ? rtnetlink_bind+0x80/0x80 [ 24.645275][ T1982] ? arch_stack_walk+0x98/0xe0 [ 24.650014][ T1982] ? __rcu_read_lock+0x50/0x50 [ 24.654753][ T1982] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 24.660236][ T1982] ? rhashtable_jhash2+0x1f1/0x330 [ 24.665324][ T1982] ? jhash+0x750/0x750 [ 24.669371][ T1982] ? rht_key_hashfn+0x157/0x240 [ 24.674196][ T1982] ? deferred_put_nlk_sk+0x200/0x200 [ 24.679456][ T1982] ? __alloc_skb+0x109/0x540 [ 24.684025][ T1982] ? jhash+0x750/0x750 [ 24.688067][ T1982] ? netlink_hash+0xd0/0xd0 [ 24.692546][ T1982] ? avc_has_perm+0x15f/0x260 [ 24.697203][ T1982] ? __rcu_read_lock+0x50/0x50 [ 24.701944][ T1982] netlink_rcv_skb+0x1f0/0x460 [ 24.706686][ T1982] ? rtnetlink_bind+0x80/0x80 [ 24.711341][ T1982] ? netlink_ack+0xa80/0xa80 [ 24.715905][ T1982] ? netlink_autobind+0x1c0/0x1c0 [ 24.720918][ T1982] ? __rcu_read_lock+0x50/0x50 [ 24.725657][ T1982] ? selinux_vm_enough_memory+0x160/0x160 [ 24.731350][ T1982] rtnetlink_rcv+0x1c/0x20 [ 24.735752][ T1982] netlink_unicast+0x87c/0xa20 [ 24.740505][ T1982] ? netlink_detachskb+0x60/0x60 [ 24.745436][ T1982] ? security_netlink_send+0xab/0xc0 [ 24.750713][ T1982] netlink_sendmsg+0x9a7/0xd40 [ 24.755458][ T1982] ? netlink_getsockopt+0x900/0x900 [ 24.760636][ T1982] ? security_socket_sendmsg+0xad/0xc0 [ 24.766070][ T1982] ? netlink_getsockopt+0x900/0x900 [ 24.771244][ T1982] ____sys_sendmsg+0x56f/0x860 [ 24.775984][ T1982] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 24.781161][ T1982] ? __fdget+0x17c/0x200 [ 24.785408][ T1982] __sys_sendmsg+0x26a/0x350 [ 24.789978][ T1982] ? errseq_set+0x102/0x140 [ 24.794451][ T1982] ? ____sys_sendmsg+0x860/0x860 [ 24.799373][ T1982] ? __rcu_read_lock+0x50/0x50 [ 24.804111][ T1982] ? alloc_file_pseudo+0x282/0x310 [ 24.809198][ T1982] ? __kasan_check_write+0x14/0x20 [ 24.814301][ T1982] ? __kasan_check_write+0x14/0x20 [ 24.819384][ T1982] ? __fpregs_load_activate+0x2fc/0x3b0 [ 24.824924][ T1982] ? switch_fpu_return+0x10/0x10 [ 24.829851][ T1982] ? __kasan_check_read+0x11/0x20 [ 24.834850][ T1982] ? fput_many+0x47/0x1a0 [ 24.839154][ T1982] __x64_sys_sendmsg+0x7f/0x90 [ 24.843893][ T1982] do_syscall_64+0xc0/0x100 [ 24.848381][ T1982] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 24.854262][ T1982] RIP: 0033:0x448f89 [ 24.858130][ T1982] Code: e8 7c e6 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 1b 05 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 24.877708][ T1982] RSP: 002b:00007f8dbf0f8ce8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 24.886095][ T1982] RAX: ffffffffffffffda RBX: 00000000006e5a28 RCX: 0000000000448f89 [ 24.894040][ T1982] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 24.901996][ T1982] RBP: 00000000006e5a20 R08: 0000000000000000 R09: 0000000000000000 [ 24.909956][ T1982] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006e5a2c [ 24.917908][ T1982] R13: 00007ffc1cca725f R14: 00007f8dbf0f99c0 R15: 20c49ba5e353f7cf [ 24.925858][ T1982] [ 24.928168][ T1982] Allocated by task 1982: [ 24.932478][ T1982] __kasan_kmalloc+0x117/0x1b0 [ 24.937233][ T1982] kasan_kmalloc+0x9/0x10 [ 24.941557][ T1982] __kmalloc+0x102/0x310 [ 24.945778][ T1982] sk_prot_alloc+0x11c/0x2f0 [ 24.950361][ T1982] sk_alloc+0x35/0x300 [ 24.954426][ T1982] tun_chr_open+0x7b/0x4a0 [ 24.958819][ T1982] misc_open+0x3ea/0x440 [ 24.963040][ T1982] chrdev_open+0x60a/0x670 [ 24.967435][ T1982] do_dentry_open+0x8f7/0x1070 [ 24.972182][ T1982] vfs_open+0x73/0x80 [ 24.976228][ T1982] path_openat+0x1681/0x42d0 [ 24.980794][ T1982] do_filp_open+0x1f7/0x430 [ 24.985290][ T1982] do_sys_open+0x36f/0x7a0 [ 24.989698][ T1982] __x64_sys_openat+0xa2/0xb0 [ 24.994462][ T1982] do_syscall_64+0xc0/0x100 [ 24.998963][ T1982] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 25.004838][ T1982] [ 25.007154][ T1982] Freed by task 1980: [ 25.011126][ T1982] __kasan_slab_free+0x168/0x220 [ 25.016054][ T1982] kasan_slab_free+0xe/0x10 [ 25.020547][ T1982] kfree+0x170/0x6d0 [ 25.024428][ T1982] __sk_destruct+0x45f/0x4e0 [ 25.028995][ T1982] __sk_free+0x35d/0x430 [ 25.033210][ T1982] sk_free+0x45/0x50 [ 25.037085][ T1982] __tun_detach+0x15d0/0x1a40 [ 25.041737][ T1982] tun_chr_close+0xb8/0xd0 [ 25.046127][ T1982] __fput+0x295/0x710 [ 25.050096][ T1982] ____fput+0x15/0x20 [ 25.054069][ T1982] task_work_run+0x176/0x1a0 [ 25.058634][ T1982] prepare_exit_to_usermode+0x2d8/0x370 [ 25.064167][ T1982] syscall_return_slowpath+0x6f/0x500 [ 25.069511][ T1982] do_syscall_64+0xe8/0x100 [ 25.073999][ T1982] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 25.079860][ T1982] [ 25.082166][ T1982] The buggy address belongs to the object at ffff8881ce7b0000 [ 25.082166][ T1982] which belongs to the cache kmalloc-2k of size 2048 [ 25.096189][ T1982] The buggy address is located 1264 bytes inside of [ 25.096189][ T1982] 2048-byte region [ffff8881ce7b0000, ffff8881ce7b0800) [ 25.109604][ T1982] The buggy address belongs to the page: [ 25.115224][ T1982] page:ffffea000739ec00 refcount:1 mapcount:0 mapping:ffff8881da802800 index:0x0 compound_mapcount: 0 [ 25.126122][ T1982] flags: 0x8000000000010200(slab|head) [ 25.131569][ T1982] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881da802800 [ 25.140125][ T1982] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 25.148675][ T1982] page dumped because: kasan: bad access detected [ 25.155056][ T1982] [ 25.157378][ T1982] Memory state around the buggy address: [ 25.162982][ T1982] ffff8881ce7b0380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.171019][ T1982] ffff8881ce7b0400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.179054][ T1982] >ffff8881ce7b0480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.187084][ T1982] ^ [ 25.194822][ T1982] ffff8881ce7b0500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb executing program [ 25.202885][ T1982] ffff8881ce7b0580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.210921][ T1982] ================================================================== [ 25.218963][ T1982] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program [ 25.528872][ T22] audit: type=1400 audit(1583587021.779:15): avc: denied { map } for pid=2017 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program