Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 25.154561][ T24] audit: type=1800 audit(1561068913.625:33): pid=6817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 25.176711][ T24] audit: type=1800 audit(1561068913.625:34): pid=6817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.096386][ T24] audit: type=1400 audit(1561068917.565:35): avc: denied { map } for pid=7010 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.40' (ECDSA) to the list of known hosts. [ 37.512313][ T24] audit: type=1400 audit(1561068925.985:36): avc: denied { map } for pid=7025 comm="syz-executor193" path="/root/syz-executor193508519" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 44.276504][ T7026] IPVS: ftp: loaded support on port[0] = 21 [ 44.293137][ T7026] chnl_net:caif_netlink_parms(): no params data found [ 44.304710][ T7026] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.311749][ T7026] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.319191][ T7026] device bridge_slave_0 entered promiscuous mode [ 44.327047][ T7026] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.334104][ T7026] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.341302][ T7026] device bridge_slave_1 entered promiscuous mode [ 44.350447][ T7026] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 44.359008][ T7026] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 44.369473][ T7026] team0: Port device team_slave_0 added [ 44.375288][ T7026] team0: Port device team_slave_1 added [ 44.409210][ T7026] device hsr_slave_0 entered promiscuous mode [ 44.448674][ T7026] device hsr_slave_1 entered promiscuous mode [ 44.520299][ T7026] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.527322][ T7026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.534521][ T7026] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.541541][ T7026] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.554690][ T7026] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.562361][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.570116][ T3041] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.577502][ T3041] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.585005][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 44.593421][ T7026] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.601016][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.609308][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.616305][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.627997][ T7026] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 44.638607][ T7026] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 44.649569][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.657625][ T7028] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.664703][ T7028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.672523][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.680528][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 44.688477][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.696426][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.704237][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 44.711462][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready executing program [ 44.721018][ T7026] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program executing program executing program [ 63.033121][ T7026] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888116815f00 (size 224): comm "syz-executor193", pid 7037, jiffies 4294942912 (age 13.460s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000001535e6b0>] kmem_cache_alloc_node+0x153/0x2a0 [<00000000d08262ab>] __alloc_skb+0x6e/0x210 [<00000000fcdfc8db>] __ip6_append_data.isra.0+0x1106/0x1180 [<0000000044c0db33>] ip6_append_data+0xf1/0x180 [<00000000b22bf665>] rawv6_sendmsg+0x842/0x12e0 [<000000002bbea150>] inet_sendmsg+0x64/0x120 [<00000000abda547d>] sock_sendmsg+0x54/0x70 [<000000007185f182>] ___sys_sendmsg+0x393/0x3c0 [<00000000113b3e74>] __sys_sendmsg+0x80/0xf0 [<000000008e6bf9e8>] __x64_sys_sendmsg+0x23/0x30 [<00000000028a778d>] do_syscall_64+0x76/0x1a0 [<00000000acbc0ade>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811345b800 (size 2048): comm "syz-executor193", pid 7037, jiffies 4294942912 (age 13.460s) hex dump (first 32 bytes): 03 02 01 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000011cf7a49>] kmem_cache_alloc_node_trace+0x15b/0x2a0 [<0000000002be7108>] __kmalloc_node_track_caller+0x38/0x50 [<00000000f0ca5add>] __kmalloc_reserve.isra.0+0x40/0xb0 [<000000001bd34307>] pskb_expand_head+0x82/0x3a0 [<00000000ecb93e13>] __pskb_pull_tail+0x61/0x5c0 [<0000000002072d2f>] nf_ct_frag6_gather+0x6e0/0x9b0 [<000000005b246deb>] ipv6_defrag+0xae/0x170 [<000000000066d879>] nf_hook_slow+0x49/0xd0 [<0000000028a6bbe8>] __ip6_local_out+0x12c/0x1d0 [<000000000d0c7ef9>] ip6_local_out+0x28/0x60 [<00000000129639a3>] ip6_send_skb+0x2a/0xb0 [<00000000e30bf2d8>] ip6_push_pending_frames+0x70/0x90 [<0000000074e47d95>] rawv6_sendmsg+0xf65/0x12e0 [<000000002bbea150>] inet_sendmsg+0x64/0x120 [<00000000abda547d>] sock_sendmsg+0x54/0x70 [<000000007185f182>] ___sys_sendmsg+0x393/0x3c0