[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.78' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 39.848356] audit: type=1400 audit(1600653977.771:8): avc: denied { execmem } for pid=6476 comm="syz-executor754" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 39.850249] netlink: 32 bytes leftover after parsing attributes in process `syz-executor754'. [ 39.877588] netlink: 3092 bytes leftover after parsing attributes in process `syz-executor754'. [ 39.886973] ================================================================================ [ 39.895668] UBSAN: Undefined behaviour in net/sched/act_police.c:161:27 [ 39.902407] shift exponent 45 is too large for 32-bit type 'int' [ 39.908876] CPU: 1 PID: 6476 Comm: syz-executor754 Not tainted 4.19.146-syzkaller #0 [ 39.916733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.926511] Call Trace: [ 39.929082] dump_stack+0x22c/0x33e [ 39.932697] ubsan_epilogue+0xe/0x3a [ 39.936392] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 39.942519] ? tcf_police_init+0x56e/0x11d0 [ 39.946824] tcf_police_init.cold+0x34/0x86 [ 39.951128] ? tcf_police_search+0x2c0/0x2c0 [ 39.955538] tcf_action_init_1+0x962/0xc40 [ 39.959757] ? tcf_action_dump_old+0x80/0x80 [ 39.964148] ? mark_held_locks+0xf0/0xf0 [ 39.968210] ? memset+0x20/0x40 [ 39.971479] tcf_action_init+0x2c3/0x490 [ 39.975534] ? tcf_action_init_1+0xc40/0xc40 [ 39.979975] ? avc_has_perm_noaudit+0x224/0x3e0 [ 39.984627] tcf_action_add+0xd9/0x360 [ 39.988497] ? tca_action_gd+0x1720/0x1720 [ 39.992724] ? memset+0x20/0x40 [ 39.995999] ? nla_parse+0x1b2/0x290 [ 39.999708] tc_ctl_action+0x337/0x417 [ 40.003594] ? tcf_action_add+0x360/0x360 [ 40.007728] ? tcf_action_add+0x360/0x360 [ 40.011870] rtnetlink_rcv_msg+0x498/0xc10 [ 40.016088] ? rtnl_get_link+0x270/0x270 [ 40.020131] ? __netlink_lookup+0x481/0x7e0 [ 40.024437] ? find_held_lock+0x2d/0x110 [ 40.028479] netlink_rcv_skb+0x160/0x440 [ 40.032528] ? rtnl_get_link+0x270/0x270 [ 40.036588] ? netlink_ack+0xae0/0xae0 [ 40.040461] netlink_unicast+0x4d5/0x690 [ 40.044506] ? netlink_sendskb+0x110/0x110 [ 40.048724] netlink_sendmsg+0x717/0xcc0 [ 40.052769] ? nlmsg_notify+0x1a0/0x1a0 [ 40.056723] ? __sock_recv_ts_and_drops+0x540/0x540 [ 40.061725] ? nlmsg_notify+0x1a0/0x1a0 [ 40.065684] sock_sendmsg+0xc7/0x130 [ 40.069380] ___sys_sendmsg+0x3b3/0x8f0 [ 40.073351] ? do_syscall_64+0xf9/0x670 [ 40.077327] ? copy_msghdr_from_user+0x440/0x440 [ 40.082096] ? mark_held_locks+0xf0/0xf0 [ 40.086140] ? find_held_lock+0x2d/0x110 [ 40.090181] ? fs_reclaim_release+0xd0/0x110 [ 40.094581] ? find_held_lock+0x2d/0x110 [ 40.098634] ? __might_fault+0x11f/0x1d0 [ 40.102679] ? lock_downgrade+0x750/0x750 [ 40.106820] ? lock_acquire+0x170/0x3f0 [ 40.110785] ? __might_fault+0xef/0x1d0 [ 40.114747] __sys_sendmmsg+0x195/0x470 [ 40.118709] ? __ia32_sys_sendmsg+0x220/0x220 [ 40.123187] ? find_held_lock+0x2d/0x110 [ 40.127250] ? __fget_light+0x1a2/0x230 [ 40.131224] ? sockfd_lookup_light+0xc6/0x180 [ 40.135734] ? __x64_sys_sendmsg+0x159/0x220 [ 40.140148] ? __sys_sendmsg+0x1b0/0x1b0 [ 40.144281] ? __sys_socket+0x16d/0x200 [ 40.148259] ? move_addr_to_kernel+0x70/0x70 [ 40.152651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 40.157389] __x64_sys_sendmmsg+0x99/0x100 [ 40.161619] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 40.166188] do_syscall_64+0xf9/0x670 [ 40.170033] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 40.175210] RIP: 0033:0x440389 [ 40.178397] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 40.197372] RSP: 002b:00007f