[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.003223][ T25] kauditd_printk_skb: 42 callbacks suppressed [ 28.003230][ T25] audit: type=1400 audit(1570126372.856:63): avc: denied { map } for pid=6684 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.236' (ECDSA) to the list of known hosts. [ 73.248465][ T25] audit: type=1400 audit(1570126418.096:64): avc: denied { map } for pid=6700 comm="syz-executor704" path="/root/syz-executor704729916" dev="sda1" ino=16498 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program [ 86.222766][ T6702] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881248f2100 (size 224): comm "syz-executor704", pid 6713, jiffies 4294945279 (age 15.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 50 98 2a 81 88 ff ff 00 68 a8 20 81 88 ff ff .P.*.....h. .... backtrace: [<00000000b98d6ac5>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000b2d03f07>] __alloc_skb+0x6e/0x210 [<000000007812bf07>] llc_alloc_frame+0x66/0x110 [<000000005dc89f54>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000ed5a6f42>] llc_conn_state_process+0x1ac/0x640 [<000000006d5c0628>] llc_establish_connection+0x110/0x170 [<000000007043c5fe>] llc_ui_connect+0x10e/0x370 [<0000000012100983>] __sys_connect+0x11d/0x170 [<000000008cc0ce57>] __x64_sys_connect+0x1e/0x30 [<00000000770d38cf>] do_syscall_64+0x73/0x1f0 [<000000009f65d3fb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888124a77800 (size 2048): comm "syz-executor704", pid 6715, jiffies 4294945279 (age 15.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1a 00 02 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000bbad14a6>] __kmalloc+0x169/0x300 [<00000000e645fea2>] sk_prot_alloc+0x112/0x170 [<00000000b49ffc05>] sk_alloc+0x35/0x2f0 [<00000000eaa952b5>] llc_sk_alloc+0x35/0x170 [<000000006b35a08c>] llc_ui_create+0x7b/0x150 [<000000002a3c48f3>] __sock_create+0x164/0x250 [<0000000089796974>] __sys_socket+0x69/0x110 [<00000000a74f5c31>] __x64_sys_socket+0x1e/0x30 [<00000000770d38cf>] do_syscall_64+0x73/0x1f0 [<000000009f65d3fb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881248f2200 (size 224): comm "syz-executor704", pid 6715, jiffies 4294945279 (age 15.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 50 98 2a 81 88 ff ff 00 78 a7 24 81 88 ff ff .P.*.....x.$.... backtrace: [<00000000b98d6ac5>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000b2d03f07>] __alloc_skb+0x6e/0x210 [<000000007812bf07>] llc_alloc_frame+0x66/0x110 [<000000005dc89f54>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000ed5a6f42>] llc_conn_state_process+0x1ac/0x640 [<000000006d5c0628>] llc_establish_connection+0x110/0x170 [<000000007043c5fe>] llc_ui_connect+0x10e/0x370 [<0000000012100983>] __sys_connect+0x11d/0x170 [<000000008cc0ce57>] __x64_sys_connect+0x1e/0x30 [<00000000770d38cf>] do_syscall_64+0x73/0x1f0 [<000000009f65d3fb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811d8dd800 (size 512): comm "syz-executor704", pid 6715, jiffies 4294945279 (age 15.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 9e 78 88 c0 37 29 00 03 00 ca .......x..7).... 7f d8 8d 1d 81 88 ff ff 10 d8 8d 1d 81 88 ff ff ................ backtrace: [<00000000d8db6ed7>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<00000000a555cc10>] __kmalloc_node_track_caller+0x38/0x50 [<0000000059f04329>] __kmalloc_reserve.isra.0+0x40/0xb0 [<00000000923258fb>] __alloc_skb+0xa0/0x210 [<000000007812bf07>] llc_alloc_frame+0x66/0x110 [<000000005dc89f54>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000ed5a6f42>] llc_conn_state_process+0x1ac/0x640 [<000000006d5c0628>] llc_establish_connection+0x110/0x170 [<000000007043c5fe>] llc_ui_connect+0x10e/0x370 [<0000000012100983>] __sys_connect+0x11d/0x170 [<000000008cc0ce57>] __x64_sys_connect+0x1e/0x30 [<00000000770d38cf>] do_syscall_64+0x73/0x1f0 [<000000009f65d3fb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881248f2100 (size 224): comm "syz-executor704", pid 6713, jiffies 4294945279 (age 18.390s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 50 98 2a 81 88 ff ff 00 68 a8 20 81 88 ff ff .P.*.....h. .... backtrace: [<00000000b98d6ac5>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000b2d03f07>] __alloc_skb+0x6e/0x210 [<000000007812bf07>] llc_alloc_frame+0x66/0x110 [<000000005dc89f54>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000ed5a6f42>] llc_conn_state_process+0x1ac/0x640 [<000000006d5c0628>] llc_establish_connection+0x110/0x170 [<000000007043c5fe>] llc_ui_connect+0x10e/0x370 [<0000000012100983>] __sys_connect+0x11d/0x170 [<000000008cc0ce57>] __x64_sys_connect+0x1e/0x30 [<00000000770d38cf>] do_syscall_64+0x73/0x1f0 [<000000009f65d3fb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888124a77800 (size 2048): comm "syz-executor704", pid 6715, jiffies 4294945279 (age 18.390s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1a 00 02 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000bbad14a6>] __kmalloc+0x169/0x300 [<00000000e645fea2>] sk_prot_alloc+0x112/0x170 [<00000000b49ffc05>] sk_alloc+0x35/0x2f0 [<00000000eaa952b5>] llc_sk_alloc+0x35/0x170 [<000000006b35a08c>] llc_ui_create+0x7b/0x150 [<000000002a3c48f3>] __sock_create+0x164/0x250 [<0000000089796974>] __sys_socket+0x69/0x110 [<00000000a74f5c31>] __x64_sys_socket+0x1e/0x30 [<00000000770d38cf>] do_syscall_64+0x73/0x1f0 [<000000009f65d3fb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881248f2200 (size 224): comm "syz-executor704", pid 6715, jiffies 4294945279 (age 18.390s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 50 98 2a 81 88 ff ff 00 78 a7 24 81 88 ff ff .P.*.....x.$.... backtrace: [<00000000b98d6ac5>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000b2d03f07>] __alloc_skb+0x6e/0x210 [<000000007812bf07>] llc_alloc_frame+0x66/0x110 [<000000005dc89f54>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000ed5a6f42>] llc_conn_state_process+0x1ac/0x640 [<000000006d5c0628>] llc_establish_connection+0x110/0x170 [<000000007043c5fe>] llc_ui_connect+0x10e/0x370 [<0000000012100983>] __sys_connect+0x11d/0x170 [<000000008cc0ce57>] __x64_sys_connect+0x1e/0x30 [<00000000770d38cf>] do_syscall_64+0x73/0x1f0 [<000000009f65d3fb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811d8dd800 (size 512): comm "syz-executor704", pid 6715, jiffies 4294945279 (age 18.390s) hex dump (first 32 bytes): 00 00 00 00 00 00 9e 78 88 c0 37 29 00 03 00 ca .......x..7).... 7f d8 8d 1d 81 88 ff ff 10 d8 8d 1d 81 88 ff ff ................ backtrace: [<00000000d8db6ed7>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<00000000a555cc10>] __kmalloc_node_track_caller+0x38/0x50 [<0000000059f04329>] __kmalloc_reserve.isra.0+0x40/0xb0 [<00000000923258fb>] __alloc_skb+0xa0/0x210 [<000000007812bf07>] llc_alloc_frame+0x66/0x110 [<000000005dc89f54>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000ed5a6f42>] llc_conn_state_process+0x1ac/0x640 [<000000006d5c0628>] llc_establish_connection+0x110/0x170 [<000000007043c5fe>] llc_ui_connect+0x10e/0x370 [<0000000012100983>] __sys_connect+0x11d/0x170 [<000000008cc0ce57>] __x64_sys_connect+0x1e/0x30 [<00000000770d38cf>] do_syscall_64+0x73/0x1f0 [<000000009f65d3fb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program executing program executing program executing program executing program