[ 147.771320][ T32] audit: type=1400 audit(1582857911.815:37): avc: denied { watch } for pid=12209 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16180 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 147.831444][ T32] audit: type=1400 audit(1582857911.855:38): avc: denied { watch } for pid=12209 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 148.483573][ T32] audit: type=1800 audit(1582857912.535:39): pid=12116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 148.512035][ T32] audit: type=1800 audit(1582857912.555:40): pid=12116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 150.869088][ T32] audit: type=1400 audit(1582857914.915:41): avc: denied { map } for pid=12292 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.11' (ECDSA) to the list of known hosts. [ 1011.160867][ T32] audit: type=1400 audit(1582858775.205:42): avc: denied { map } for pid=12304 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/02/28 02:59:35 parsed 1 programs [ 1017.065166][ T32] audit: type=1400 audit(1582858781.115:43): avc: denied { integrity } for pid=12304 comm="syz-execprog" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 1017.204204][ T32] audit: type=1400 audit(1582858781.255:44): avc: denied { map } for pid=12304 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17425 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/02/28 02:59:45 executed programs: 0 [ 1021.233230][T12320] IPVS: ftp: loaded support on port[0] = 21 [ 1021.361448][T12320] chnl_net:caif_netlink_parms(): no params data found [ 1021.458843][T12320] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.466327][T12320] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.475637][T12320] device bridge_slave_0 entered promiscuous mode [ 1021.488528][T12320] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.496021][T12320] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.505460][T12320] device bridge_slave_1 entered promiscuous mode [ 1021.537784][T12320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1021.552433][T12320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1021.586845][T12320] team0: Port device team_slave_0 added [ 1021.598625][T12320] team0: Port device team_slave_1 added [ 1021.626797][T12320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1021.633874][T12320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1021.659956][T12320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1021.674887][T12320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1021.682044][T12320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1021.708083][T12320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1021.786849][T12320] device hsr_slave_0 entered promiscuous mode [ 1021.833349][T12320] device hsr_slave_1 entered promiscuous mode [ 1022.039076][ T32] audit: type=1400 audit(1582858786.085:45): avc: denied { create } for pid=12320 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1022.065787][ T32] audit: type=1400 audit(1582858786.115:46): avc: denied { write } for pid=12320 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1022.070043][T12320] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1022.090808][ T32] audit: type=1400 audit(1582858786.115:47): avc: denied { read } for pid=12320 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1022.149018][T12320] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1022.208628][T12320] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1022.279011][T12320] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1022.378209][T12320] bridge0: port 2(bridge_slave_1) entered blocking state [ 1022.385584][T12320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1022.393558][T12320] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.400739][T12320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1022.416750][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1022.426998][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1022.539695][T12320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1022.567215][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1022.578009][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1022.595592][T12320] 8021q: adding VLAN 0 to HW filter on device team0 [ 1022.612422][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1022.624133][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1022.633700][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.640868][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1022.660078][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1022.669676][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1022.680494][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 1022.687820][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1022.705888][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1022.725964][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1022.756992][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1022.767355][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1022.777797][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1022.787957][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1022.799530][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1022.816370][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1022.826328][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1022.844197][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1022.854658][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1022.872404][T12320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1022.915235][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1022.923081][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1022.949287][T12320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1022.995473][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1023.005010][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1023.047865][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1023.058132][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1023.072505][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1023.082371][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1023.097246][T12320] device veth0_vlan entered promiscuous mode [ 1023.121866][T12320] device veth1_vlan entered promiscuous mode [ 1023.178560][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1023.187967][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1023.197454][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1023.206980][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1023.228563][T12320] device veth0_macvtap entered promiscuous mode [ 1023.244639][T12320] device veth1_macvtap entered promiscuous mode [ 1023.283110][T12320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1023.290773][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1023.300406][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1023.309585][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1023.319020][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1023.341677][T12320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1023.349510][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1023.360019][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1023.649190][ T32] audit: type=1400 audit(1582858787.695:48): avc: denied { associate } for pid=12320 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 2020/02/28 02:59:50 executed programs: 20 [ 1028.131842][T12702] ===================================================== [ 1028.138874][T12702] BUG: KMSAN: use-after-free in __list_add_valid+0x280/0x420 [ 1028.146280][T12702] CPU: 1 PID: 12702 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 1028.154972][T12702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1028.165116][T12702] Call Trace: [ 1028.168414][T12702] dump_stack+0x1c9/0x220 [ 1028.172743][T12702] kmsan_report+0xf7/0x1e0 [ 1028.177244][T12702] __msan_warning+0x58/0xa0 [ 1028.181754][T12702] __list_add_valid+0x280/0x420 [ 1028.186613][T12702] rdma_listen+0x623/0x10b0 [ 1028.191113][T12702] ? kmsan_set_origin_checked+0x95/0xf0 [ 1028.196665][T12702] ? kmsan_get_metadata+0x11d/0x180 [ 1028.201871][T12702] ucma_listen+0x36c/0x5e0 [ 1028.206328][T12702] ? ucma_connect+0xa40/0xa40 [ 1028.211021][T12702] ucma_write+0x5c5/0x630 [ 1028.215398][T12702] ? ucma_get_global_nl_info+0xe0/0xe0 [ 1028.220880][T12702] __vfs_write+0x1a9/0xca0 [ 1028.225328][T12702] ? rw_verify_area+0x2c4/0x5b0 [ 1028.230182][T12702] ? kmsan_get_metadata+0x11d/0x180 [ 1028.235388][T12702] vfs_write+0x44a/0x8f0 [ 1028.239636][T12702] ksys_write+0x267/0x450 [ 1028.243975][T12702] __ia32_sys_write+0xdb/0x120 [ 1028.248739][T12702] ? __se_sys_write+0xb0/0xb0 [ 1028.253426][T12702] do_fast_syscall_32+0x3c7/0x6e0 [ 1028.258474][T12702] entry_SYSENTER_compat+0x68/0x77 [ 1028.263581][T12702] RIP: 0023:0xf7f33d99 [ 1028.267640][T12702] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1028.287329][T12702] RSP: 002b:00000000f7eec0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 1028.295872][T12702] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 1028.303901][T12702] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000000 [ 1028.311979][T12702] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1028.319951][T12702] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1028.327915][T12702] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1028.335887][T12702] [ 1028.338208][T12702] Uninit was created at: [ 1028.342450][T12702] kmsan_internal_poison_shadow+0x66/0xd0 [ 1028.348170][T12702] kmsan_slab_free+0x6e/0xb0 [ 1028.352770][T12702] kfree+0x565/0x30a0 [ 1028.356833][T12702] rdma_destroy_id+0x197e/0x1b40 [ 1028.361763][T12702] ucma_close+0x334/0x4c0 [ 1028.366100][T12702] __fput+0x4c7/0xb90 [ 1028.370109][T12702] ____fput+0x37/0x40 [ 1028.374086][T12702] task_work_run+0x214/0x2b0 [ 1028.378671][T12702] prepare_exit_to_usermode+0x3c8/0x520 [ 1028.384310][T12702] syscall_return_slowpath+0x95/0x5f0 [ 1028.389674][T12702] do_fast_syscall_32+0x422/0x6e0 [ 1028.394699][T12702] entry_SYSENTER_compat+0x68/0x77 [ 1028.399793][T12702] ===================================================== [ 1028.406710][T12702] Disabling lock debugging due to kernel taint [ 1028.412848][T12702] Kernel panic - not syncing: panic_on_warn set ... [ 1028.419440][T12702] CPU: 1 PID: 12702 Comm: syz-executor.0 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 1028.429488][T12702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1028.439554][T12702] Call Trace: [ 1028.442860][T12702] dump_stack+0x1c9/0x220 [ 1028.447337][T12702] panic+0x3d5/0xc3e [ 1028.451262][T12702] kmsan_report+0x1df/0x1e0 [ 1028.455775][T12702] __msan_warning+0x58/0xa0 [ 1028.460432][T12702] __list_add_valid+0x280/0x420 [ 1028.465416][T12702] rdma_listen+0x623/0x10b0 [ 1028.469936][T12702] ? kmsan_set_origin_checked+0x95/0xf0 [ 1028.475488][T12702] ? kmsan_get_metadata+0x11d/0x180 [ 1028.480692][T12702] ucma_listen+0x36c/0x5e0 [ 1028.485138][T12702] ? ucma_connect+0xa40/0xa40 [ 1028.489842][T12702] ucma_write+0x5c5/0x630 [ 1028.494201][T12702] ? ucma_get_global_nl_info+0xe0/0xe0 [ 1028.499662][T12702] __vfs_write+0x1a9/0xca0 [ 1028.504121][T12702] ? rw_verify_area+0x2c4/0x5b0 [ 1028.508990][T12702] ? kmsan_get_metadata+0x11d/0x180 [ 1028.514284][T12702] vfs_write+0x44a/0x8f0 [ 1028.518536][T12702] ksys_write+0x267/0x450 [ 1028.522875][T12702] __ia32_sys_write+0xdb/0x120 [ 1028.527639][T12702] ? __se_sys_write+0xb0/0xb0 [ 1028.532311][T12702] do_fast_syscall_32+0x3c7/0x6e0 [ 1028.537364][T12702] entry_SYSENTER_compat+0x68/0x77 [ 1028.542480][T12702] RIP: 0023:0xf7f33d99 [ 1028.546586][T12702] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1028.566184][T12702] RSP: 002b:00000000f7eec0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 1028.574583][T12702] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 1028.582571][T12702] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000000 [ 1028.590551][T12702] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1028.598637][T12702] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1028.606609][T12702] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1028.616080][T12702] Kernel Offset: 0x17600000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1028.627737][T12702] Rebooting in 86400 seconds..