[ 96.455921][ T23] audit: type=1400 audit(1578548949.792:37): avc: denied { watch } for pid=10232 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 96.480809][ T23] audit: type=1400 audit(1578548949.792:38): avc: denied { watch } for pid=10232 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 96.904822][ T23] audit: type=1800 audit(1578548950.242:39): pid=10146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 96.926761][ T23] audit: type=1800 audit(1578548950.252:40): pid=10146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 98.734088][ T23] audit: type=1400 audit(1578548952.072:41): avc: denied { map } for pid=10324 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.31' (ECDSA) to the list of known hosts. [ 105.475741][ T23] audit: type=1400 audit(1578548958.812:42): avc: denied { map } for pid=10336 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/01/09 05:49:18 parsed 1 programs [ 107.268424][ T23] audit: type=1400 audit(1578548960.612:43): avc: denied { map } for pid=10336 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1039 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/01/09 05:49:20 executed programs: 0 [ 107.501903][T10353] IPVS: ftp: loaded support on port[0] = 21 [ 107.572920][T10353] chnl_net:caif_netlink_parms(): no params data found [ 107.605573][T10353] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.613339][T10353] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.621307][T10353] device bridge_slave_0 entered promiscuous mode [ 107.630133][T10353] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.637341][T10353] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.645657][T10353] device bridge_slave_1 entered promiscuous mode [ 107.664071][T10353] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 107.675976][T10353] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 107.696719][T10353] team0: Port device team_slave_0 added [ 107.704781][T10353] team0: Port device team_slave_1 added [ 107.789171][T10353] device hsr_slave_0 entered promiscuous mode [ 107.837722][T10353] device hsr_slave_1 entered promiscuous mode [ 107.952916][ T23] audit: type=1400 audit(1578548961.292:44): avc: denied { create } for pid=10353 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 107.955579][T10353] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 107.985224][ T23] audit: type=1400 audit(1578548961.292:45): avc: denied { write } for pid=10353 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 108.010728][ T23] audit: type=1400 audit(1578548961.292:46): avc: denied { read } for pid=10353 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 108.079900][T10353] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 108.119659][T10353] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 108.160059][T10353] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 108.230084][T10353] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.237358][T10353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.245127][T10353] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.252322][T10353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.295699][T10353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.311194][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.322163][ T2687] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.330541][ T2687] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.339009][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 108.351232][T10353] 8021q: adding VLAN 0 to HW filter on device team0 [ 108.362538][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.371303][ T2808] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.378472][ T2808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.391790][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.400694][ T2687] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.407817][ T2687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.429908][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.439622][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.455751][T10353] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 108.466515][T10353] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 108.479365][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 108.487784][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.496443][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.504899][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 108.523225][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 108.531265][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 108.544064][T10353] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 108.564273][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.586370][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 108.594693][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.605470][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.613646][ T2808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.622951][T10353] device veth0_vlan entered promiscuous mode [ 108.636928][T10353] device veth1_vlan entered promiscuous mode [ 108.654102][ T23] audit: type=1400 audit(1578548961.992:47): avc: denied { associate } for pid=10353 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 108.734987][ T23] audit: type=1400 audit(1578548962.072:48): avc: denied { create } for pid=10355 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 108.760126][T10357] kasan: CONFIG_KASAN_INLINE enabled [ 108.762097][ T23] audit: type=1400 audit(1578548962.072:49): avc: denied { write } for pid=10355 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 108.765608][T10357] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 108.765631][T10357] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 108.765649][T10357] CPU: 0 PID: 10357 Comm: syz-executor.0 Not tainted 5.5.0-rc5-syzkaller #0 [ 108.814093][T10357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.824149][T10357] RIP: 0010:hash_ipport4_uadt+0x1f6/0xc20 [ 108.829854][T10357] Code: 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 45 09 00 00 4c 89 ea 45 8b 76 04 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 4c 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e7 [ 108.849444][T10357] RSP: 0018:ffffc90001f17170 EFLAGS: 00010246 [ 108.855503][T10357] RAX: dffffc0000000000 RBX: ffffc90001f17320 RCX: 0000000000000000 [ 108.863465][T10357] RDX: 0000000000000000 RSI: ffffffff867c0973 RDI: ffff8880a8d75844 [ 108.871441][T10357] RBP: ffffc90001f172b8 R08: 0000000000000000 R09: 0000000000000000 [ 108.879413][T10357] R10: ffffed1015d0703c R11: ffff8880ae8381e3 R12: ffffc90001f17220 [ 108.887380][T10357] R13: 0000000000000000 R14: 0000000001040000 R15: ffff8880a0557800 [ 108.895447][T10357] FS: 00007fe7dd35a700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 108.904391][T10357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 108.910982][T10357] CR2: 0000000000000000 CR3: 00000000a1014000 CR4: 00000000001406f0 [ 108.918944][T10357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 108.926902][T10357] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 108.934957][T10357] Call Trace: [ 108.938285][T10357] ? mark_held_locks+0xf0/0xf0 [ 108.943049][T10357] ? hash_ipport_create+0xa60/0xa60 [ 108.948380][T10357] ? hash_ipport6_kadt+0x4c0/0x4c0 [ 108.953538][T10357] ? nla_memcpy+0xb0/0xb0 [ 108.957924][T10357] ? ip_set_utest+0x4aa/0x890 [ 108.962707][T10357] ? __kasan_check_read+0x11/0x20 [ 108.967731][T10357] ip_set_utest+0x55b/0x890 [ 108.972219][T10357] ? ip_set_put_byindex+0x490/0x490 [ 108.977440][T10357] ? __mutex_lock+0x458/0x13c0 [ 108.982198][T10357] ? ip_set_put_byindex+0x490/0x490 [ 108.987415][T10357] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 108.992374][T10357] ? nfnetlink_bind+0x2c0/0x2c0 [ 108.997268][T10357] ? avc_has_extended_perms+0x10f0/0x10f0 [ 109.002985][T10357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.009225][T10357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.015463][T10357] ? cred_has_capability+0x199/0x330 [ 109.020746][T10357] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 109.026379][T10357] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 109.031994][T10357] ? __local_bh_enable_ip+0x15a/0x270 [ 109.037353][T10357] ? __check_heap_object+0x93/0xb3 [ 109.042460][T10357] netlink_rcv_skb+0x177/0x450 [ 109.047212][T10357] ? nfnetlink_bind+0x2c0/0x2c0 [ 109.052054][T10357] ? netlink_ack+0xb50/0xb50 [ 109.056625][T10357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.062927][T10357] ? ns_capable_common+0x93/0x100 [ 109.068006][T10357] ? ns_capable+0x20/0x30 [ 109.072380][T10357] ? __netlink_ns_capable+0x104/0x140 [ 109.077873][T10357] nfnetlink_rcv+0x1ba/0x460 [ 109.082481][T10357] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 109.087925][T10357] ? netlink_deliver_tap+0x24a/0xbe0 [ 109.093258][T10357] netlink_unicast+0x58c/0x7d0 [ 109.098020][T10357] ? netlink_attachskb+0x870/0x870 [ 109.103117][T10357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.109377][T10357] netlink_sendmsg+0x91c/0xea0 [ 109.114133][T10357] ? netlink_unicast+0x7d0/0x7d0 [ 109.119052][T10357] ? tomoyo_socket_sendmsg+0x26/0x30 [ 109.124316][T10357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.130535][T10357] ? security_socket_sendmsg+0x8d/0xc0 [ 109.135974][T10357] ? netlink_unicast+0x7d0/0x7d0 [ 109.140917][T10357] sock_sendmsg+0xd7/0x130 [ 109.145316][T10357] ____sys_sendmsg+0x753/0x880 [ 109.150064][T10357] ? kernel_sendmsg+0x50/0x50 [ 109.154728][T10357] ? __fget+0x35d/0x550 [ 109.158863][T10357] ? find_held_lock+0x35/0x130 [ 109.163618][T10357] ___sys_sendmsg+0x100/0x170 [ 109.168275][T10357] ? sendmsg_copy_msghdr+0x70/0x70 [ 109.173401][T10357] ? __kasan_check_read+0x11/0x20 [ 109.178419][T10357] ? __fget+0x37f/0x550 [ 109.182562][T10357] ? ksys_dup3+0x3e0/0x3e0 [ 109.186968][T10357] ? __fget_light+0x1a9/0x230 [ 109.191640][T10357] ? __fdget+0x1b/0x20 [ 109.195689][T10357] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 109.201924][T10357] __sys_sendmsg+0x105/0x1d0 [ 109.206493][T10357] ? __sys_sendmsg_sock+0xc0/0xc0 [ 109.211519][T10357] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 109.216983][T10357] ? do_syscall_64+0x26/0x790 [ 109.221646][T10357] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 109.227794][T10357] ? do_syscall_64+0x26/0x790 [ 109.232472][T10357] __x64_sys_sendmsg+0x78/0xb0 [ 109.237235][T10357] do_syscall_64+0xfa/0x790 [ 109.241720][T10357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 109.247591][T10357] RIP: 0033:0x45af49 [ 109.251554][T10357] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 109.271323][T10357] RSP: 002b:00007fe7dd359c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 109.279719][T10357] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 109.287680][T10357] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 000000000000000a [ 109.295763][T10357] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 109.303734][T10357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7dd35a6d4 [ 109.311711][T10357] R13: 00000000004c9e62 R14: 00000000004e2e98 R15: 00000000ffffffff [ 109.319924][T10357] Modules linked in: [ 109.323856][T10357] ---[ end trace ba24aaf230a77dfd ]--- [ 109.330033][T10357] RIP: 0010:hash_ipport4_uadt+0x1f6/0xc20 [ 109.335743][T10357] Code: 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 45 09 00 00 4c 89 ea 45 8b 76 04 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 4c 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e7 [ 109.355385][T10357] RSP: 0018:ffffc90001f17170 EFLAGS: 00010246 [ 109.361488][T10357] RAX: dffffc0000000000 RBX: ffffc90001f17320 RCX: 0000000000000000 [ 109.369521][T10357] RDX: 0000000000000000 RSI: ffffffff867c0973 RDI: ffff8880a8d75844 [ 109.377515][T10357] RBP: ffffc90001f172b8 R08: 0000000000000000 R09: 0000000000000000 [ 109.385474][T10357] R10: ffffed1015d0703c R11: ffff8880ae8381e3 R12: ffffc90001f17220 [ 109.393641][T10357] R13: 0000000000000000 R14: 0000000001040000 R15: ffff8880a0557800 [ 109.401632][T10357] FS: 00007fe7dd35a700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 109.410608][T10357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 109.417207][T10357] CR2: 0000000000000000 CR3: 00000000a1014000 CR4: 00000000001406f0 [ 109.425182][T10357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 109.433180][T10357] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 109.441333][T10357] Kernel panic - not syncing: Fatal exception in interrupt [ 109.451091][T10357] Kernel Offset: disabled [ 109.455439][T10357] Rebooting in 86400 seconds..