[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c[ 25.613770][ T22] kauditd_printk_skb: 16 callbacks suppressed . [ 25.613775][ T22] audit: type=1800 audit(1567542016.042:33): pid=6856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 25.643456][ T22] audit: type=1800 audit(1567542016.062:34): pid=6856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 26.370758][ T22] audit: type=1400 audit(1567542016.802:35): avc: denied { map } for pid=7026 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.204' (ECDSA) to the list of known hosts. syzkaller login: [ 49.658486][ T22] audit: type=1400 audit(1567542040.092:36): avc: denied { map } for pid=7042 comm="syz-executor771" path="/root/syz-executor771209949" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 56.431169][ T7043] IPVS: ftp: loaded support on port[0] = 21 [ 56.459962][ T7043] chnl_net:caif_netlink_parms(): no params data found [ 56.471418][ T7043] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.478935][ T7043] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.486277][ T7043] device bridge_slave_0 entered promiscuous mode [ 56.492930][ T7043] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.499991][ T7043] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.507244][ T7043] device bridge_slave_1 entered promiscuous mode [ 56.516338][ T7043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.525830][ T7043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.537068][ T7043] team0: Port device team_slave_0 added [ 56.543238][ T7043] team0: Port device team_slave_1 added [ 56.585933][ T7043] device hsr_slave_0 entered promiscuous mode [ 56.635330][ T7043] device hsr_slave_1 entered promiscuous mode [ 56.666988][ T7043] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.674192][ T7043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.681427][ T7043] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.688441][ T7043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.701958][ T7043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.709858][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.727600][ T3547] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.736182][ T3547] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.743422][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 56.751753][ T7043] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.769449][ T2918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.777614][ T2918] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.784804][ T2918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.795970][ T7043] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 56.806529][ T7043] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 56.817544][ T7045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.825747][ T7045] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.832868][ T7045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.840366][ T7045] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.849287][ T7045] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.857403][ T7045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.865333][ T7045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.873282][ T7045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready executing program [ 56.880558][ T7045] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.890412][ T7043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.445637][ T7] device bridge_slave_1 left promiscuous mode [ 58.451757][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.505500][ T7] device bridge_slave_0 left promiscuous mode [ 58.511643][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.705550][ T7] device hsr_slave_0 left promiscuous mode [ 58.745291][ T7] device hsr_slave_1 left promiscuous mode [ 58.786466][ T7] team0 (unregistering): Port device team_slave_1 removed [ 58.794296][ T7] team0 (unregistering): Port device team_slave_0 removed [ 58.802211][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 58.835914][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 58.878784][ T7] bond0 (unregistering): Released all slaves [ 62.776671][ T7042] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88812516ea00 (size 512): comm "kworker/u4:4", pid 2582, jiffies 4294942958 (age 7.830s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 ea 16 25 81 88 ff ff ...........%.... 08 ea 16 25 81 88 ff ff 18 ea 16 25 81 88 ff ff ...%.......%.... backtrace: [<00000000054176c4>] __kmalloc+0x169/0x300 [<00000000776ed1cb>] rds_message_alloc+0x3e/0xc0 [<00000000314f5946>] rds_send_probe.constprop.0+0x42/0x380 [<00000000075ff21a>] rds_send_pong+0x1e/0x23 [<00000000716b37ae>] rds_recv_incoming+0x46c/0x570 [<00000000d951349a>] rds_loop_xmit+0x86/0x100 [<000000005047ca83>] rds_send_xmit+0x55d/0xa50 [<00000000b3449726>] rds_send_worker+0x3c/0x150 [<0000000007ec1777>] process_one_work+0x210/0x490 [<000000008949d75c>] worker_thread+0x56/0x4c0 [<00000000fd2303d2>] kthread+0x13e/0x160 [<00000000060d1fcb>] ret_from_fork+0x1f/0x30