audit: type=1400 audit(1601371090.319:12): avc: denied { name_connect } for pid=8564 comm="syz-executor.3" dest=20000 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 ================================================================================ UBSAN: Undefined behaviour in net/netfilter/ipset/ip_set_hash_gen.h:125:6 shift exponent 32 is too large for 32-bit type 'unsigned int' CPU: 1 PID: 8590 Comm: syz-executor.5 Not tainted 4.19.148-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 audit: type=1400 audit(1601371090.329:13): avc: denied { name_bind } for pid=8564 comm="syz-executor.3" src=20000 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 ubsan_epilogue+0xe/0x3a lib/ubsan.c:161 __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 lib/ubsan.c:422 htable_bits net/netfilter/ipset/ip_set_hash_gen.h:125 [inline] hash_ipmark_create.cold+0x19/0x27 net/netfilter/ipset/ip_set_hash_gen.h:1290 ip_set_create+0x70e/0x1380 net/netfilter/ipset/ip_set_core.c:940 nfnetlink_rcv_msg+0xeff/0x1210 net/netfilter/nfnetlink.c:233 netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2455 audit: type=1400 audit(1601371090.329:14): avc: denied { node_bind } for pid=8564 comm="syz-executor.3" src=20000 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 nfnetlink_rcv+0x1b2/0x41b net/netfilter/nfnetlink.c:565 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x717/0xcc0 net/netlink/af_netlink.c:1909 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xc7/0x130 net/socket.c:632 ___sys_sendmsg+0x7bb/0x8f0 net/socket.c:2115 __sys_sendmsg net/socket.c:2153 [inline] __do_sys_sendmsg net/socket.c:2162 [inline] __se_sys_sendmsg net/socket.c:2160 [inline] __x64_sys_sendmsg+0x132/0x220 net/socket.c:2160 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45dd99 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f236065ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 0000000000029b40 RCX: 000000000045dd99 RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c R13: 00007ffc84bec8af R14: 00007f236065f9c0 R15: 000000000118bf2c ================================================================================ netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23342 sclass=netlink_route_socket pid=8565 comm=syz-executor.4 syz-executor.3 calls setitimer() with new_value NULL pointer. Misfeature support will be removed SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8615 comm=syz-executor.4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8625 comm=syz-executor.4 netlink: 'syz-executor.5': attribute type 1 has an invalid length. device bond1 entered promiscuous mode bond1: making interface bridge1 the new active one device bridge1 entered promiscuous mode bond1: Enslaving bridge1 as an active interface with an up link SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=8684 comm=syz-executor.3 netlink: 'syz-executor.5': attribute type 1 has an invalid length. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=8684 comm=syz-executor.3 bond1: Enslaving bridge2 as an active interface with a down link netlink: 'syz-executor.1': attribute type 4 has an invalid length. device lo entered promiscuous mode netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 108 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 'syz-executor.1': attribute type 4 has an invalid length. sctp: [Deprecated]: syz-executor.0 (pid 8794) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor.0 (pid 8805) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue EXT4-fs warning (device loop4): read_mmp_block:110: Error -117 while reading MMP block 0 encrypted_key: master key parameter '' is invalid audit: type=1400 audit(1601371095.399:15): avc: denied { mac_admin } for pid=8921 comm="syz-executor.0" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 SELinux: Context system_u:object_r:crack_db_t:s0 is not valid (left unmapped). audit: type=1400 audit(1601371095.479:16): avc: denied { relabelto } for pid=8921 comm="syz-executor.0" name="UNIX" dev="sockfs" ino=32594 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=unix_stream_socket permissive=1 audit: type=1804 audit(1601371095.809:17): pid=8967 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir908652292/syzkaller.2x6DYo/33/bus" dev="sda1" ino=15861 res=1 audit: type=1804 audit(1601371095.819:18): pid=8970 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir908652292/syzkaller.2x6DYo/33/bus" dev="sda1" ino=15861 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. syz-executor.0 (9034) used greatest stack depth: 23248 bytes left block nbd1: Receive control failed (result -107) block nbd1: Attempted send on invalid socket block nbd1: shutting down sockets print_req_error: I/O error, dev nbd1, sector 0 IPVS: ftp: loaded support on port[0] = 21 Buffer I/O error on dev nbd1, logical block 0, async page read print_req_error: I/O error, dev nbd1, sector 2 Buffer I/O error on dev nbd1, logical block 1, async page read print_req_error: I/O error, dev nbd1, sector 4 Buffer I/O error on dev nbd1, logical block 2, async page read print_req_error: I/O error, dev nbd1, sector 6 Buffer I/O error on dev nbd1, logical block 3, async page read print_req_error: I/O error, dev nbd1, sector 0 Buffer I/O error on dev nbd1, logical block 0, async page read print_req_error: I/O error, dev nbd1, sector 2 Buffer I/O error on dev nbd1, logical block 1, async page read print_req_error: I/O error, dev nbd1, sector 4 Buffer I/O error on dev nbd1, logical block 2, async page read print_req_error: I/O error, dev nbd1, sector 6 Buffer I/O error on dev nbd1, logical block 3, async page read print_req_error: I/O error, dev nbd1, sector 0 Buffer I/O error on dev nbd1, logical block 0, async page read print_req_error: I/O error, dev nbd1, sector 2 Buffer I/O error on dev nbd1, logical block 1, async page read ldm_validate_partition_table(): Disk read failed. Dev nbd1: unable to read RDB block 0 nbd1: unable to read partition table ldm_validate_partition_table(): Disk read failed. nft_compat: unsupported protocol 0 Dev nbd1: unable to read RDB block 0 nbd1: unable to read partition table ldm_validate_partition_table(): Disk read failed. Dev nbd1: unable to read RDB block 0 IPVS: ftp: loaded support on port[0] = 21 nbd1: unable to read partition table ldm_validate_partition_table(): Disk read failed. Dev nbd1: unable to read RDB block 0 nbd1: unable to read partition table audit: type=1800 audit(1601371098.560:19): pid=9175 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15878 res=0 audit: type=1804 audit(1601371098.590:20): pid=9175 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir540710895/syzkaller.qRmeUc/45/file0" dev="sda1" ino=15878 res=1 netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=112 sclass=netlink_route_socket pid=9191 comm=syz-executor.2 netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=112 sclass=netlink_route_socket pid=9191 comm=syz-executor.2 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. IPVS: ftp: loaded support on port[0] = 21 ================================================================================ UBSAN: Undefined behaviour in net/sched/sch_api.c:375:22 shift exponent 129 is too large for 32-bit type 'int' CPU: 0 PID: 9217 Comm: syz-executor.5 Not tainted 4.19.148-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 ubsan_epilogue+0xe/0x3a lib/ubsan.c:161 __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 lib/ubsan.c:422 __detect_linklayer net/sched/sch_api.c:375 [inline] qdisc_get_rtab.cold+0x1d/0x8e net/sched/sch_api.c:421 tcf_police_init+0xe7f/0x11d0 net/sched/act_police.c:134 tcf_action_init_1+0x1b0/0xc40 net/sched/act_api.c:873 tcf_exts_validate+0x128/0x430 net/sched/cls_api.c:2060 flow_change+0x4b4/0x1d20 net/sched/cls_flow.c:447 tc_new_tfilter+0xb38/0x1570 net/sched/cls_api.c:1320 rtnetlink_rcv_msg+0x498/0xc10 net/core/rtnetlink.c:4778 netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2455 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x717/0xcc0 net/netlink/af_netlink.c:1909 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xc7/0x130 net/socket.c:632 ___sys_sendmsg+0x3b3/0x8f0 net/socket.c:2115 __sys_sendmmsg+0x195/0x470 net/socket.c:2210 __do_sys_sendmmsg net/socket.c:2239 [inline] __se_sys_sendmmsg net/socket.c:2236 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2236 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45dd99 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f236063dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000027f40 RCX: 000000000045dd99 RDX: 010efe10675dec16 RSI: 0000000020000200 RDI: 0000000000000003 RBP: 000000000118c010 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 R13: 00007ffc84bec8af R14: 00007f236063e9c0 R15: 000000000118bfd4 ================================================================================ ================================================================================ UBSAN: Undefined behaviour in net/sched/sch_api.c:376:24 shift exponent 129 is too large for 32-bit type 'int' CPU: 0 PID: 9217 Comm: syz-executor.5 Not tainted 4.19.148-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 ubsan_epilogue+0xe/0x3a lib/ubsan.c:161 __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 lib/ubsan.c:422 __detect_linklayer net/sched/sch_api.c:376 [inline] qdisc_get_rtab.cold+0x7f/0x8e net/sched/sch_api.c:421 tcf_police_init+0xe7f/0x11d0 net/sched/act_police.c:134 tcf_action_init_1+0x1b0/0xc40 net/sched/act_api.c:873 tcf_exts_validate+0x128/0x430 net/sched/cls_api.c:2060 flow_change+0x4b4/0x1d20 net/sched/cls_flow.c:447 tc_new_tfilter+0xb38/0x1570 net/sched/cls_api.c:1320 rtnetlink_rcv_msg+0x498/0xc10 net/core/rtnetlink.c:4778 netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2455 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x717/0xcc0 net/netlink/af_netlink.c:1909 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xc7/0x130 net/socket.c:632 ___sys_sendmsg+0x3b3/0x8f0 net/socket.c:2115 __sys_sendmmsg+0x195/0x470 net/socket.c:2210 __do_sys_sendmmsg net/socket.c:2239 [inline] __se_sys_sendmmsg net/socket.c:2236 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2236 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45dd99 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f236063dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000027f40 RCX: 000000000045dd99 RDX: 010efe10675dec16 RSI: 0000000020000200 RDI: 0000000000000003 RBP: 000000000118c010 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 R13: 00007ffc84bec8af R14: 00007f236063e9c0 R15: 000000000118bfd4 ================================================================================ netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. IPVS: ftp: loaded support on port[0] = 21