[ 95.718324][ T27] audit: type=1800 audit(1578544506.277:40): pid=10224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 97.641184][ T27] audit: type=1400 audit(1578544508.217:41): avc: denied { map } for pid=10402 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.225' (ECDSA) to the list of known hosts. [ 104.523697][ T27] audit: type=1400 audit(1578544515.107:42): avc: denied { map } for pid=10414 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/01/09 04:35:15 parsed 1 programs [ 106.497825][ T27] audit: type=1400 audit(1578544517.077:43): avc: denied { map } for pid=10414 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=22401 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/01/09 04:35:17 executed programs: 0 [ 106.778400][T10432] IPVS: ftp: loaded support on port[0] = 21 [ 106.856021][T10432] chnl_net:caif_netlink_parms(): no params data found [ 106.891069][T10432] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.899000][T10432] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.907671][T10432] device bridge_slave_0 entered promiscuous mode [ 106.916490][T10432] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.924408][T10432] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.932269][T10432] device bridge_slave_1 entered promiscuous mode [ 106.952785][T10432] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 106.965040][T10432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 106.986188][T10432] team0: Port device team_slave_0 added [ 106.993836][T10432] team0: Port device team_slave_1 added [ 107.045092][T10432] device hsr_slave_0 entered promiscuous mode [ 107.102559][T10432] device hsr_slave_1 entered promiscuous mode [ 107.229317][ T27] audit: type=1400 audit(1578544517.807:44): avc: denied { create } for pid=10432 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 107.232033][T10432] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 107.262351][ T27] audit: type=1400 audit(1578544517.807:45): avc: denied { write } for pid=10432 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 107.287905][ T27] audit: type=1400 audit(1578544517.807:46): avc: denied { read } for pid=10432 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 107.335612][T10432] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 107.404608][T10432] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 107.484586][T10432] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 107.556455][T10432] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.563798][T10432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.571658][T10432] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.578882][T10432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.624331][T10432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.637962][ T2741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.650230][ T2741] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.659047][ T2741] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.667637][ T2741] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 107.680855][T10432] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.692072][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.700787][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.707901][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.721687][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.730197][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.737355][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.763878][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.773827][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.785663][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.793940][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.806837][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.818204][T10432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.837708][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 107.845784][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 107.859347][T10432] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.878956][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 107.888875][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.907577][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 107.916822][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.925806][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.934648][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.944634][T10432] device veth0_vlan entered promiscuous mode [ 107.957850][T10432] device veth1_vlan entered promiscuous mode [ 107.974439][ T27] audit: type=1400 audit(1578544518.557:47): avc: denied { associate } for pid=10432 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 108.078504][ T27] audit: type=1400 audit(1578544518.657:48): avc: denied { create } for pid=10434 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 108.110124][ T27] audit: type=1400 audit(1578544518.657:49): avc: denied { write } for pid=10434 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 108.113707][T10435] kasan: CONFIG_KASAN_INLINE enabled [ 108.140594][T10435] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 108.148744][T10435] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 108.155677][T10435] CPU: 1 PID: 10435 Comm: syz-executor.0 Not tainted 5.5.0-rc5-syzkaller #0 [ 108.164415][T10435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.174468][T10435] RIP: 0010:hash_netport6_uadt+0x21d/0xdb0 [ 108.180259][T10435] Code: 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 3a 09 00 00 4c 89 f2 45 8b 7f 04 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 4c 89 f0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 ff [ 108.199859][T10435] RSP: 0018:ffffc9000208f160 EFLAGS: 00010246 [ 108.205912][T10435] RAX: dffffc0000000000 RBX: ffffc9000208f320 RCX: 0000000000000000 [ 108.213928][T10435] RDX: 0000000000000000 RSI: ffffffff8680fd4a RDI: ffff88809ef3d060 [ 108.221907][T10435] RBP: ffffc9000208f2b8 R08: 0000000000000000 R09: 0000000000000000 [ 108.229865][T10435] R10: ffffed1015d2703c R11: ffff8880ae9381e3 R12: ffff8880a778c000 [ 108.237820][T10435] R13: ffffc9000208f1e0 R14: 0000000000000000 R15: 0000000000000000 [ 108.245780][T10435] FS: 00007f2b00378700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 108.254693][T10435] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 108.261259][T10435] CR2: 0000000000000000 CR3: 00000000a27be000 CR4: 00000000001406e0 [ 108.269319][T10435] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 108.277286][T10435] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 108.285237][T10435] Call Trace: [ 108.288518][T10435] ? hash_netport_create+0xa60/0xa60 [ 108.293787][T10435] ? hash_netport6_same_set+0x1a0/0x1a0 [ 108.299322][T10435] ? ip_set_utest+0x4aa/0x890 [ 108.304089][T10435] ? __kasan_check_read+0x11/0x20 [ 108.309116][T10435] ip_set_utest+0x55b/0x890 [ 108.313624][T10435] ? ip_set_put_byindex+0x490/0x490 [ 108.318823][T10435] ? __mutex_lock+0x458/0x13c0 [ 108.323595][T10435] ? ip_set_put_byindex+0x490/0x490 [ 108.328804][T10435] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 108.333733][T10435] ? nfnetlink_bind+0x2c0/0x2c0 [ 108.338570][T10435] ? avc_has_extended_perms+0x10f0/0x10f0 [ 108.344281][T10435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.350876][T10435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.357290][T10435] ? cred_has_capability+0x199/0x330 [ 108.363038][T10435] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 108.368675][T10435] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 108.374360][T10435] ? __local_bh_enable_ip+0x15a/0x270 [ 108.379727][T10435] ? __check_heap_object+0x93/0xb3 [ 108.384823][T10435] netlink_rcv_skb+0x177/0x450 [ 108.389614][T10435] ? nfnetlink_bind+0x2c0/0x2c0 [ 108.394540][T10435] ? netlink_ack+0xb50/0xb50 [ 108.399216][T10435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.405456][T10435] ? ns_capable_common+0x93/0x100 [ 108.410467][T10435] ? ns_capable+0x20/0x30 [ 108.414808][T10435] ? __netlink_ns_capable+0x104/0x140 [ 108.420186][T10435] nfnetlink_rcv+0x1ba/0x460 [ 108.424759][T10435] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 108.430199][T10435] ? netlink_deliver_tap+0x24a/0xbe0 [ 108.435471][T10435] netlink_unicast+0x58c/0x7d0 [ 108.440224][T10435] ? netlink_attachskb+0x870/0x870 [ 108.445341][T10435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.451771][T10435] netlink_sendmsg+0x91c/0xea0 [ 108.456525][T10435] ? netlink_unicast+0x7d0/0x7d0 [ 108.461454][T10435] ? tomoyo_socket_sendmsg+0x26/0x30 [ 108.466751][T10435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.472985][T10435] ? security_socket_sendmsg+0x8d/0xc0 [ 108.478457][T10435] ? netlink_unicast+0x7d0/0x7d0 [ 108.483392][T10435] sock_sendmsg+0xd7/0x130 [ 108.487809][T10435] ____sys_sendmsg+0x753/0x880 [ 108.492587][T10435] ? kernel_sendmsg+0x50/0x50 [ 108.497261][T10435] ? __fget+0x35d/0x550 [ 108.501414][T10435] ? find_held_lock+0x35/0x130 [ 108.506169][T10435] ___sys_sendmsg+0x100/0x170 [ 108.510835][T10435] ? sendmsg_copy_msghdr+0x70/0x70 [ 108.515987][T10435] ? __kasan_check_read+0x11/0x20 [ 108.521130][T10435] ? __fget+0x37f/0x550 [ 108.525274][T10435] ? ksys_dup3+0x3e0/0x3e0 [ 108.529680][T10435] ? __fget_light+0x1a9/0x230 [ 108.534337][T10435] ? __fdget+0x1b/0x20 [ 108.538398][T10435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 108.544639][T10435] __sys_sendmsg+0x105/0x1d0 [ 108.549227][T10435] ? __sys_sendmsg_sock+0xc0/0xc0 [ 108.554251][T10435] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 108.559708][T10435] ? do_syscall_64+0x26/0x790 [ 108.564370][T10435] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.571031][T10435] ? do_syscall_64+0x26/0x790 [ 108.575708][T10435] __x64_sys_sendmsg+0x78/0xb0 [ 108.580460][T10435] do_syscall_64+0xfa/0x790 [ 108.584962][T10435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.590855][T10435] RIP: 0033:0x45af49 [ 108.594844][T10435] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 108.614435][T10435] RSP: 002b:00007f2b00377c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.622836][T10435] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 108.630796][T10435] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000007 [ 108.640077][T10435] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 108.648032][T10435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b003786d4 [ 108.655989][T10435] R13: 00000000004c9e62 R14: 00000000004e2e98 R15: 00000000ffffffff [ 108.663978][T10435] Modules linked in: [ 108.667976][T10435] ---[ end trace a75c07b5e2077fb4 ]--- [ 108.673488][T10435] RIP: 0010:hash_netport6_uadt+0x21d/0xdb0 [ 108.679470][T10435] Code: 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 3a 09 00 00 4c 89 f2 45 8b 7f 04 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 4c 89 f0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 ff [ 108.699711][T10435] RSP: 0018:ffffc9000208f160 EFLAGS: 00010246 [ 108.705820][T10435] RAX: dffffc0000000000 RBX: ffffc9000208f320 RCX: 0000000000000000 [ 108.713827][T10435] RDX: 0000000000000000 RSI: ffffffff8680fd4a RDI: ffff88809ef3d060 [ 108.721812][T10435] RBP: ffffc9000208f2b8 R08: 0000000000000000 R09: 0000000000000000 [ 108.729936][T10435] R10: ffffed1015d2703c R11: ffff8880ae9381e3 R12: ffff8880a778c000 [ 108.737939][T10435] R13: ffffc9000208f1e0 R14: 0000000000000000 R15: 0000000000000000 [ 108.745949][T10435] FS: 00007f2b00378700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 108.754919][T10435] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 108.761520][T10435] CR2: 0000000000000000 CR3: 00000000a27be000 CR4: 00000000001406e0 [ 108.769525][T10435] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 108.780496][T10435] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 108.788498][T10435] Kernel panic - not syncing: Fatal exception in interrupt [ 108.797118][T10435] Kernel Offset: disabled [ 108.801449][T10435] Rebooting in 86400 seconds..