[ 29.163372][ T26] audit: type=1400 audit(1584744031.936:37): avc: denied { watch } for pid=7209 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 29.187894][ T26] audit: type=1400 audit(1584744031.936:38): avc: denied { watch } for pid=7209 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 29.276836][ T26] audit: type=1800 audit(1584744032.056:39): pid=7113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 29.299132][ T26] audit: type=1800 audit(1584744032.056:40): pid=7113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 31.919287][ T26] audit: type=1400 audit(1584744034.696:41): avc: denied { map } for pid=7292 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.22' (ECDSA) to the list of known hosts. [ 620.328970][ T26] audit: type=1400 audit(1584744623.106:42): avc: denied { map } for pid=7306 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/20 22:50:23 parsed 1 programs [ 621.582691][ T26] audit: type=1400 audit(1584744624.356:43): avc: denied { integrity } for pid=7306 comm="syz-execprog" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 621.609136][ T26] audit: type=1400 audit(1584744624.356:44): avc: denied { map } for pid=7306 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=51 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 621.636462][ T3824] kmemleak: Automatic memory scanning thread ended 2020/03/20 22:50:31 executed programs: 0 [ 628.438742][ T7323] IPVS: ftp: loaded support on port[0] = 21 [ 628.459093][ T7323] chnl_net:caif_netlink_parms(): no params data found [ 628.477672][ T7323] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.484912][ T7323] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.492132][ T7323] device bridge_slave_0 entered promiscuous mode [ 628.499365][ T7323] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.506471][ T7323] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.513729][ T7323] device bridge_slave_1 entered promiscuous mode [ 628.523068][ T7323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 628.532880][ T7323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 628.544974][ T7323] team0: Port device team_slave_0 added [ 628.551329][ T7323] team0: Port device team_slave_1 added [ 628.559583][ T7323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 628.566516][ T7323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 628.592474][ T7323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 628.603700][ T7323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 628.611088][ T7323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 628.637161][ T7323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 628.694342][ T7323] device hsr_slave_0 entered promiscuous mode [ 628.753814][ T7323] device hsr_slave_1 entered promiscuous mode [ 628.811368][ T26] audit: type=1400 audit(1584744631.586:45): avc: denied { create } for pid=7323 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 628.811688][ T7323] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 628.838252][ T26] audit: type=1400 audit(1584744631.586:46): avc: denied { write } for pid=7323 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 628.867304][ T26] audit: type=1400 audit(1584744631.586:47): avc: denied { read } for pid=7323 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 628.874835][ T7323] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 628.944539][ T7323] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 628.994611][ T7323] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 629.049836][ T7323] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.056897][ T7323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.064174][ T7323] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.071206][ T7323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.091573][ T7323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 629.100696][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.108304][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.115663][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.122953][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 629.132097][ T7323] 8021q: adding VLAN 0 to HW filter on device team0 [ 629.140388][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.148859][ T7332] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.155882][ T7332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.172233][ T7323] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 629.182619][ T7323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 629.193898][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.202053][ T7333] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.209080][ T7333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.216557][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 629.224624][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 629.232564][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.240795][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.248694][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 629.255940][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 629.268932][ T7323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 629.276365][ T222] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 629.283712][ T222] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 629.295449][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 629.308966][ T7323] device veth0_vlan entered promiscuous mode [ 629.315257][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.323149][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.330624][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 629.340195][ T7323] device veth1_vlan entered promiscuous mode [ 629.352266][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 629.359993][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 629.367714][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 629.376830][ T7323] device veth0_macvtap entered promiscuous mode [ 629.384670][ T7323] device veth1_macvtap entered promiscuous mode [ 629.394989][ T7323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 629.402213][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 629.410768][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 629.419957][ T7323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 629.427252][ T7333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 629.468756][ T26] audit: type=1400 audit(1584744632.246:48): avc: denied { associate } for pid=7323 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 2020/03/20 22:50:37 executed programs: 1 [ 638.813793][ T0] NOHZ: local_softirq_pending 08 2020/03/20 22:50:43 executed programs: 3 2020/03/20 22:50:49 executed programs: 5 2020/03/20 22:50:54 executed programs: 7 2020/03/20 22:51:01 executed programs: 9 2020/03/20 22:51:07 executed programs: 11 2020/03/20 22:51:14 executed programs: 13 2020/03/20 22:51:20 executed programs: 15 [ 679.773775][ T0] NOHZ: local_softirq_pending 08 2020/03/20 22:51:27 executed programs: 17 2020/03/20 22:51:33 executed programs: 19 2020/03/20 22:51:39 executed programs: 21 2020/03/20 22:51:46 executed programs: 23 2020/03/20 22:51:51 executed programs: 25 2020/03/20 22:51:57 executed programs: 27 2020/03/20 22:52:02 executed programs: 29 [ 720.743991][ T0] NOHZ: local_softirq_pending 08 2020/03/20 22:52:08 executed programs: 31 2020/03/20 22:52:14 executed programs: 33 2020/03/20 22:52:19 executed programs: 35 [ 741.213808][ T0] NOHZ: local_softirq_pending 08 2020/03/20 22:52:25 executed programs: 37 2020/03/20 22:52:31 executed programs: 39 2020/03/20 22:52:36 executed programs: 41 2020/03/20 22:52:42 executed programs: 43 [ 761.693868][ T0] NOHZ: local_softirq_pending 08 2020/03/20 22:52:48 executed programs: 45 2020/03/20 22:52:54 executed programs: 47 2020/03/20 22:53:01 executed programs: 49 [ 782.173812][ T0] NOHZ: local_softirq_pending 08 2020/03/20 22:53:07 executed programs: 51 2020/03/20 22:53:12 executed programs: 53 2020/03/20 22:53:18 executed programs: 55 2020/03/20 22:53:24 executed programs: 57 2020/03/20 22:53:29 executed programs: 59 2020/03/20 22:53:35 executed programs: 61 2020/03/20 22:53:41 executed programs: 63 2020/03/20 22:53:46 executed programs: 65 2020/03/20 22:53:52 executed programs: 67 2020/03/20 22:53:58 executed programs: 69 2020/03/20 22:54:03 executed programs: 71 [ 843.613805][ T0] NOHZ: local_softirq_pending 08 2020/03/20 22:54:09 executed programs: 73 2020/03/20 22:54:14 executed programs: 75 2020/03/20 22:54:20 executed programs: 77 2020/03/20 22:54:26 executed programs: 79 [ 864.093805][ T0] NOHZ: local_softirq_pending 08 2020/03/20 22:54:32 executed programs: 81 2020/03/20 22:54:37 executed programs: 83 2020/03/20 22:54:44 executed programs: 85 [ 882.811109][ T7747] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 884.573786][ T0] NOHZ: local_softirq_pending 08 [ 887.797384][ T7747] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888115d21800 (size 2048): comm "softirq", pid 0, jiffies 4295000234 (age 260.300s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000651ff901>] sk_prot_alloc+0x10b/0x170 [<00000000c2a30b1d>] sk_alloc+0x30/0x330 [<00000000114b730e>] nr_rx_frame+0x43c/0x9b0 [<00000000495e0564>] nr_loopback_timer+0x48/0xc0 [<000000003d9a119e>] call_timer_fn+0x3a/0x1d0 [<000000000b30ee99>] run_timer_softirq+0x237/0x6b0 [<0000000003bac5be>] __do_softirq+0x118/0x34a [<0000000032b82a25>] irq_exit+0xb5/0xd0 [<00000000aa61e240>] smp_apic_timer_interrupt+0x91/0x190 [<000000007de5f005>] apic_timer_interrupt+0xf/0x20 [<00000000cae286ef>] native_safe_halt+0xe/0x10 [<000000003dc65850>] default_idle+0x21/0x170 [<0000000036c529bf>] do_idle+0x1b7/0x290 [<000000009d6a2b89>] cpu_startup_entry+0x14/0x20 [<0000000066ba79db>] start_secondary+0x164/0x1b0 [<00000000e3ba18b8>] secondary_startup_64+0xa4/0xb0 BUG: memory leak unreferenced object 0xffff8881198deb20 (size 32): comm "softirq", pid 0, jiffies 4295000234 (age 260.300s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<00000000a5b707da>] selinux_sk_alloc_security+0x43/0xa0 [<00000000552ccf1b>] security_sk_alloc+0x42/0x70 [<00000000d9f60ab2>] sk_prot_alloc+0x126/0x170 [<00000000c2a30b1d>] sk_alloc+0x30/0x330 [<00000000114b730e>] nr_rx_frame+0x43c/0x9b0 [<00000000495e0564>] nr_loopback_timer+0x48/0xc0 [<000000003d9a119e>] call_timer_fn+0x3a/0x1d0 [<000000000b30ee99>] run_timer_softirq+0x237/0x6b0 [<0000000003bac5be>] __do_softirq+0x118/0x34a [<0000000032b82a25>] irq_exit+0xb5/0xd0 [<00000000aa61e240>] smp_apic_timer_interrupt+0x91/0x190 [<000000007de5f005>] apic_timer_interrupt+0xf/0x20 [<00000000cae286ef>] native_safe_halt+0xe/0x10 [<000000003dc65850>] default_idle+0x21/0x170 [<0000000036c529bf>] do_idle+0x1b7/0x290 [<000000009d6a2b89>] cpu_startup_entry+0x14/0x20 BUG: memory leak unreferenced object 0xffff88812480b800 (size 2048): comm "softirq", pid 0, jiffies 4295000769 (age 254.950s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000651ff901>] sk_prot_alloc+0x10b/0x170 [<00000000c2a30b1d>] sk_alloc+0x30/0x330 [<00000000114b730e>] nr_rx_frame+0x43c/0x9b0 [<00000000495e0564>] nr_loopback_timer+0x48/0xc0 [<000000003d9a119e>] call_timer_fn+0x3a/0x1d0 [<000000000b30ee99>] run_timer_softirq+0x237/0x6b0 [<0000000003bac5be>] __do_softirq+0x118/0x34a [<0000000032b82a25>] irq_exit+0xb5/0xd0 [<00000000aa61e240>] smp_apic_timer_interrupt+0x91/0x190 [<000000007de5f005>] apic_timer_interrupt+0xf/0x20 [<00000000cae286ef>] native_safe_halt+0xe/0x10 [<000000003dc65850>] default_idle+0x21/0x170 [<0000000036c529bf>] do_idle+0x1b7/0x290 [<000000009d6a2b89>] cpu_startup_entry+0x14/0x20 [<0000000066ba79db>] start_secondary+0x164/0x1b0 [<00000000e3ba18b8>] secondary_startup_64+0xa4/0xb0