[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.147' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 40.735620] audit: type=1400 audit(1600621298.660:8): avc: denied { execmem } for pid=6482 comm="syz-executor040" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 40.737928] ================================================================================ [ 40.764182] UBSAN: Undefined behaviour in net/netfilter/ipset/ip_set_hash_gen.h:125:6 [ 40.772137] shift exponent 32 is too large for 32-bit type 'unsigned int' [ 40.779072] CPU: 1 PID: 6482 Comm: syz-executor040 Not tainted 4.19.146-syzkaller #0 [ 40.786928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.796259] Call Trace: [ 40.798837] dump_stack+0x22c/0x33e [ 40.802460] ubsan_epilogue+0xe/0x3a [ 40.806165] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 40.812313] ? hash_netport_create+0x366/0xa50 [ 40.816877] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 40.821875] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 40.826701] hash_netport_create.cold+0x1a/0x1f [ 40.831351] ? hash_netport6_add+0x27e0/0x27e0 [ 40.835916] ip_set_create+0x70e/0x1380 [ 40.839873] ? __find_set_type_get+0x450/0x450 [ 40.844458] ? lock_downgrade+0x750/0x750 [ 40.848596] ? __find_set_type_get+0x450/0x450 [ 40.853179] nfnetlink_rcv_msg+0xeff/0x1210 [ 40.857490] ? nfnetlink_net_init+0x170/0x170 [ 40.861980] ? avc_has_extended_perms+0x1020/0x1020 [ 40.866975] ? avc_has_extended_perms+0x1020/0x1020 [ 40.871974] ? __lock_acquire+0x6ec/0x3ff0 [ 40.876191] ? mark_held_locks+0xf0/0xf0 [ 40.880239] ? cred_has_capability+0x162/0x2e0 [ 40.884802] ? cred_has_capability+0x1d9/0x2e0 [ 40.889365] ? selinux_inode_copy_up+0x180/0x180 [ 40.894101] ? selinux_inode_copy_up+0x180/0x180 [ 40.898841] netlink_rcv_skb+0x160/0x440 [ 40.903001] ? nfnetlink_net_init+0x170/0x170 [ 40.907479] ? netlink_ack+0xae0/0xae0 [ 40.911402] ? ns_capable_common+0x117/0x140 [ 40.915799] nfnetlink_rcv+0x1b2/0x41b [ 40.919686] ? nfnetlink_rcv_batch+0x1710/0x1710 [ 40.924433] netlink_unicast+0x4d5/0x690 [ 40.928495] ? netlink_sendskb+0x110/0x110 [ 40.932713] netlink_sendmsg+0x717/0xcc0 [ 40.937016] ? nlmsg_notify+0x1a0/0x1a0 [ 40.940979] ? nlmsg_notify+0x1a0/0x1a0 [ 40.944934] sock_sendmsg+0xc7/0x130 [ 40.948853] sock_no_sendpage+0xf5/0x140 [ 40.952898] ? sk_page_frag_refill+0x1d0/0x1d0 [ 40.957468] ? pipe_lock+0x63/0x80 [ 40.960996] ? pipe_lock+0x63/0x80 [ 40.964520] ? sk_page_frag_refill+0x1d0/0x1d0 [ 40.969090] sock_sendpage+0xdf/0x140 [ 40.972883] pipe_to_sendpage+0x268/0x330 [ 40.977010] ? move_addr_to_kernel.part.0+0x110/0x110 [ 40.982182] ? direct_splice_actor+0x160/0x160 [ 40.986775] ? splice_from_pipe_next.part.0+0x2d5/0x390 [ 40.992130] __splice_from_pipe+0x3af/0x820 [ 40.996432] ? direct_splice_actor+0x160/0x160 [ 41.000998] generic_splice_sendpage+0xd4/0x140 [ 41.005649] ? __splice_from_pipe+0x820/0x820 [ 41.010126] ? security_file_permission+0x1c0/0x230 [ 41.015123] ? __splice_from_pipe+0x820/0x820 [ 41.019606] __se_sys_splice+0xf31/0x15f0 [ 41.023740] ? __sys_socket+0x16d/0x200 [ 41.027705] ? move_addr_to_kernel+0x70/0x70 [ 41.032097] ? __se_sys_tee+0xa10/0xa10 [ 41.036076] ? trace_hardirqs_off_caller+0x69/0x210 [ 41.041074] ? do_syscall_64+0x21/0x670 [ 41.045031] do_syscall_64+0xf9/0x670 [ 41.048815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.053987] RIP: 0033:0x4404e9 [ 41.057158] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 41.077170] RSP: 002b:00007ffeab5e4fd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 41.084858] RAX: ffffffff