[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 127.078358][ T32] kauditd_printk_skb: 4 callbacks suppressed [ 127.078406][ T32] audit: type=1800 audit(1582537322.129:39): pid=11667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 127.128866][ T32] audit: type=1800 audit(1582537322.159:40): pid=11667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 128.119443][ T32] audit: type=1400 audit(1582537323.169:41): avc: denied { map } for pid=11842 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.101' (ECDSA) to the list of known hosts. syzkaller login: [ 136.833810][ T32] audit: type=1400 audit(1582537331.879:42): avc: denied { map } for pid=11854 comm="syz-executor414" path="/root/syz-executor414402703" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 136.885126][T11855] IPVS: ftp: loaded support on port[0] = 21 [ 136.999984][T11855] chnl_net:caif_netlink_parms(): no params data found [ 137.085313][T11855] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.092528][T11855] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.101643][T11855] device bridge_slave_0 entered promiscuous mode [ 137.113192][T11855] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.120787][T11855] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.129357][T11855] device bridge_slave_1 entered promiscuous mode [ 137.158343][T11855] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 137.172358][T11855] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 137.202135][T11855] team0: Port device team_slave_0 added [ 137.212712][T11855] team0: Port device team_slave_1 added [ 137.237928][T11855] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 137.244980][T11855] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.271328][T11855] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 137.285869][T11855] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 137.292882][T11855] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.319078][T11855] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 137.387883][T11855] device hsr_slave_0 entered promiscuous mode [ 137.434817][T11855] device hsr_slave_1 entered promiscuous mode [ 137.606507][ T32] audit: type=1400 audit(1582537332.659:43): avc: denied { create } for pid=11855 comm="syz-executor414" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 137.613420][T11855] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 137.631628][ T32] audit: type=1400 audit(1582537332.659:44): avc: denied { write } for pid=11855 comm="syz-executor414" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 137.663223][ T32] audit: type=1400 audit(1582537332.659:45): avc: denied { read } for pid=11855 comm="syz-executor414" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 137.709801][T11855] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 137.759711][T11855] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 137.819632][T11855] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 137.924006][T11855] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.931527][T11855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.939411][T11855] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.946772][T11855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.028452][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.038427][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.074460][T11855] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.097539][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.106620][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.122718][T11855] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.140584][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.150489][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.159957][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.167394][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.183132][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.192415][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.201898][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.209121][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.229482][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.256011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.266165][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.276634][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.287531][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.302128][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.311913][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.335396][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.345023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.362083][T11855] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 138.375253][T11855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 138.383747][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.393540][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.429588][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 138.437575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 138.459265][T11855] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 138.501758][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 138.511435][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.550230][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 138.559822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.573428][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.582881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.598690][T11855] device veth0_vlan entered promiscuous mode [ 138.620622][T11855] device veth1_vlan entered promiscuous mode [ 138.668817][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 138.678026][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 138.687553][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 138.697026][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.715007][T11855] device veth0_macvtap entered promiscuous mode [ 138.731215][T11855] device veth1_macvtap entered promiscuous mode [ 138.769789][T11855] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 138.777716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 138.786994][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 138.796495][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.806134][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.826613][T11855] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 138.835761][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.845701][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 139.091083][ T32] audit: type=1400 audit(1582537334.139:46): avc: denied { prog_load } for pid=11855 comm="syz-executor414" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 139.125456][ T32] audit: type=1400 audit(1582537334.179:47): avc: denied { prog_run } for pid=11855 comm="syz-executor414" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 139.125866][T11855] ===================================================== [ 139.155867][T11855] BUG: KMSAN: uninit-value in br_dev_xmit+0x99a/0x1730 [ 139.162725][T11855] CPU: 0 PID: 11855 Comm: syz-executor414 Not tainted 5.6.0-rc2-syzkaller #0 [ 139.171469][T11855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.181520][T11855] Call Trace: [ 139.184818][T11855] dump_stack+0x1c9/0x220 [ 139.189150][T11855] kmsan_report+0xf7/0x1e0 [ 139.193577][T11855] __msan_warning+0x58/0xa0 [ 139.198208][T11855] br_dev_xmit+0x99a/0x1730 [ 139.202806][T11855] ? br_net_exit+0x230/0x230 [ 139.207473][T11855] dev_hard_start_xmit+0x531/0xab0 [ 139.212654][T11855] ? kmsan_get_metadata+0x11d/0x180 [ 139.217876][T11855] __dev_queue_xmit+0x37de/0x4220 [ 139.223282][T11855] dev_queue_xmit+0x4b/0x60 [ 139.227896][T11855] __bpf_redirect+0x11d5/0x1440 [ 139.232809][T11855] bpf_clone_redirect+0x466/0x620 [ 139.237837][T11855] ? bpf_prog_a481c1313990ee2c+0x4f8/0x1000 [ 139.243721][T11855] bpf_prog_a481c1313990ee2c+0x554/0x1000 [ 139.249489][T11855] ? bpf_prog_a481c1313990ee2c+0x4f8/0x1000 [ 139.255451][T11855] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 139.261699][T11855] ? kmsan_get_metadata+0x4f/0x180 [ 139.267058][T11855] ? kmsan_internal_set_origin+0x75/0xb0 [ 139.272682][T11855] ? __msan_poison_alloca+0xf0/0x120 [ 139.277968][T11855] ? kmsan_get_metadata+0x11d/0x180 [ 139.283158][T11855] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 139.288967][T11855] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 139.295023][T11855] ? ktime_get+0x2b8/0x400 [ 139.299487][T11855] ? kmsan_get_metadata+0x4f/0x180 [ 139.304607][T11855] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 139.310422][T11855] ? bpf_prog_a481c1313990ee2c+0x4f8/0x1000 [ 139.316320][T11855] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 139.322483][T11855] bpf_test_run+0x60c/0xe50 [ 139.326987][T11855] ? kmsan_get_metadata+0x11d/0x180 [ 139.332197][T11855] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 139.338010][T11855] bpf_prog_test_run_skb+0xcab/0x24a0 [ 139.343403][T11855] ? bpf_fentry_test6+0xd0/0xd0 [ 139.348293][T11855] __do_sys_bpf+0xa684/0x13510 [ 139.353074][T11855] ? kmsan_get_metadata+0x11d/0x180 [ 139.358329][T11855] ? kmsan_set_origin_checked+0x95/0xf0 [ 139.364720][T11855] ? kmsan_get_metadata+0x11d/0x180 [ 139.370355][T11855] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 139.376258][T11855] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 139.382327][T11855] ? prepare_exit_to_usermode+0x1ca/0x520 [ 139.388082][T11855] ? kmsan_get_metadata+0x4f/0x180 [ 139.393210][T11855] ? kmsan_get_metadata+0x4f/0x180 [ 139.398315][T11855] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 139.404133][T11855] __ia32_sys_bpf+0xdb/0x120 [ 139.408787][T11855] ? __se_sys_bpf+0xa0/0xa0 [ 139.413294][T11855] do_fast_syscall_32+0x3c7/0x6e0 [ 139.418458][T11855] entry_SYSENTER_compat+0x68/0x77 [ 139.423625][T11855] RIP: 0023:0xf7f39d99 [ 139.427690][T11855] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 139.447808][T11855] RSP: 002b:00000000ff88460c EFLAGS: 00000246 ORIG_RAX: 0000000000000165 [ 139.456312][T11855] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000040 [ 139.464282][T11855] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 000000000000005b [ 139.472253][T11855] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 139.480322][T11855] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 139.488761][T11855] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 139.496788][T11855] [ 139.499103][T11855] Uninit was created at: [ 139.503339][T11855] kmsan_internal_poison_shadow+0x66/0xd0 [ 139.509049][T11855] kmsan_slab_alloc+0x8a/0xe0 [ 139.513754][T11855] __kmalloc_node_track_caller+0xb40/0x1200 [ 139.519689][T11855] pskb_expand_head+0x20b/0x1b00 [ 139.524622][T11855] skb_ensure_writable+0x3ea/0x490 [ 139.529730][T11855] bpf_clone_redirect+0x251/0x620 [ 139.534751][T11855] bpf_prog_a481c1313990ee2c+0x554/0x1000 [ 139.540462][T11855] bpf_test_run+0x60c/0xe50 [ 139.544958][T11855] bpf_prog_test_run_skb+0xcab/0x24a0 [ 139.550327][T11855] __do_sys_bpf+0xa684/0x13510 [ 139.555074][T11855] __ia32_sys_bpf+0xdb/0x120 [ 139.559647][T11855] do_fast_syscall_32+0x3c7/0x6e0 [ 139.564665][T11855] entry_SYSENTER_compat+0x68/0x77 [ 139.569761][T11855] ===================================================== [ 139.576677][T11855] Disabling lock debugging due to kernel taint [ 139.582813][T11855] Kernel panic - not syncing: panic_on_warn set ... [ 139.589391][T11855] CPU: 0 PID: 11855 Comm: syz-executor414 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 139.599516][T11855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.609572][T11855] Call Trace: [ 139.612857][T11855] dump_stack+0x1c9/0x220 [ 139.617178][T11855] panic+0x3d5/0xc3e [ 139.621100][T11855] kmsan_report+0x1df/0x1e0 [ 139.625621][T11855] __msan_warning+0x58/0xa0 [ 139.630136][T11855] br_dev_xmit+0x99a/0x1730 [ 139.634661][T11855] ? br_net_exit+0x230/0x230 [ 139.639258][T11855] dev_hard_start_xmit+0x531/0xab0 [ 139.644385][T11855] ? kmsan_get_metadata+0x11d/0x180 [ 139.649602][T11855] __dev_queue_xmit+0x37de/0x4220 [ 139.654680][T11855] dev_queue_xmit+0x4b/0x60 [ 139.659189][T11855] __bpf_redirect+0x11d5/0x1440 [ 139.664112][T11855] bpf_clone_redirect+0x466/0x620 [ 139.669154][T11855] ? bpf_prog_a481c1313990ee2c+0x4f8/0x1000 [ 139.675052][T11855] bpf_prog_a481c1313990ee2c+0x554/0x1000 [ 139.680771][T11855] ? bpf_prog_a481c1313990ee2c+0x4f8/0x1000 [ 139.686673][T11855] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 139.692819][T11855] ? kmsan_get_metadata+0x4f/0x180 [ 139.697932][T11855] ? kmsan_internal_set_origin+0x75/0xb0 [ 139.703562][T11855] ? __msan_poison_alloca+0xf0/0x120 [ 139.708844][T11855] ? kmsan_get_metadata+0x11d/0x180 [ 139.714075][T11855] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 139.719892][T11855] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 139.725972][T11855] ? ktime_get+0x2b8/0x400 [ 139.730378][T11855] ? kmsan_get_metadata+0x4f/0x180 [ 139.735488][T11855] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 139.741287][T11855] ? bpf_prog_a481c1313990ee2c+0x4f8/0x1000 [ 139.747175][T11855] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 139.753250][T11855] bpf_test_run+0x60c/0xe50 [ 139.757748][T11855] ? kmsan_get_metadata+0x11d/0x180 [ 139.762954][T11855] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 139.768760][T11855] bpf_prog_test_run_skb+0xcab/0x24a0 [ 139.774159][T11855] ? bpf_fentry_test6+0xd0/0xd0 [ 139.779003][T11855] __do_sys_bpf+0xa684/0x13510 [ 139.783783][T11855] ? kmsan_get_metadata+0x11d/0x180 [ 139.788980][T11855] ? kmsan_set_origin_checked+0x95/0xf0 [ 139.794524][T11855] ? kmsan_get_metadata+0x11d/0x180 [ 139.799723][T11855] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 139.805519][T11855] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 139.811649][T11855] ? prepare_exit_to_usermode+0x1ca/0x520 [ 139.817360][T11855] ? kmsan_get_metadata+0x4f/0x180 [ 139.822456][T11855] ? kmsan_get_metadata+0x4f/0x180 [ 139.827577][T11855] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 139.833376][T11855] __ia32_sys_bpf+0xdb/0x120 [ 139.837974][T11855] ? __se_sys_bpf+0xa0/0xa0 [ 139.842481][T11855] do_fast_syscall_32+0x3c7/0x6e0 [ 139.847519][T11855] entry_SYSENTER_compat+0x68/0x77 [ 139.852632][T11855] RIP: 0023:0xf7f39d99 [ 139.856692][T11855] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 139.876347][T11855] RSP: 002b:00000000ff88460c EFLAGS: 00000246 ORIG_RAX: 0000000000000165 [ 139.884763][T11855] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000040 [ 139.892736][T11855] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 000000000000005b [ 139.900763][T11855] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 139.908723][T11855] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 139.916680][T11855] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 139.925909][T11855] Kernel Offset: 0x17000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 139.937538][T11855] Rebooting in 86400 seconds..