[ 26.775876][ T25] audit: type=1804 audit(1570361976.814:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 26.798488][ T25] audit: type=1804 audit(1570361976.834:47): pid=7030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 26.820600][ T25] audit: type=1804 audit(1570361976.834:48): pid=7031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 26.847271][ T25] audit: type=1804 audit(1570361976.894:49): pid=7027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 26.873397][ T25] audit: type=1804 audit(1570361976.914:50): pid=7029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 38.754905][ T25] kauditd_printk_skb: 10 callbacks suppressed [ 38.754912][ T25] audit: type=1400 audit(1570361988.794:61): avc: denied { map } for pid=7038 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.55' (ECDSA) to the list of known hosts. [ 44.631449][ T25] audit: type=1400 audit(1570361994.674:62): avc: denied { map } for pid=7050 comm="syz-executor173" path="/root/syz-executor173257531" dev="sda1" ino=16502 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program [ 70.311331][ T7050] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 71.496773][ T3781] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811e0f0800 (size 2048): comm "syz-executor173", pid 7053, jiffies 4294943614 (age 13.980s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1a 00 02 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000f1780650>] __kmalloc+0x169/0x300 [<000000002724b65b>] sk_prot_alloc+0x112/0x170 [<00000000e8ac9f31>] sk_alloc+0x35/0x2f0 [<00000000b978edde>] llc_sk_alloc+0x35/0x170 [<000000007f2e124c>] llc_ui_create+0x7b/0x150 [<00000000b1b33a0f>] __sock_create+0x164/0x250 [<000000004f358332>] __sys_socket+0x69/0x110 [<0000000001588e73>] __x64_sys_socket+0x1e/0x30 [<00000000616e243a>] do_syscall_64+0x73/0x1f0 [<00000000c03632b9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881232dd600 (size 32): comm "syz-executor173", pid 7053, jiffies 4294943614 (age 13.980s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e1 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<000000001ce80f88>] kmem_cache_alloc_trace+0x145/0x2c0 [<0000000003b03359>] selinux_sk_alloc_security+0x48/0xb0 [<00000000013ba0bd>] security_sk_alloc+0x49/0x70 [<0000000065045004>] sk_prot_alloc+0x12d/0x170 [<00000000e8ac9f31>] sk_alloc+0x35/0x2f0 [<00000000b978edde>] llc_sk_alloc+0x35/0x170 [<000000007f2e124c>] llc_ui_create+0x7b/0x150 [<00000000b1b33a0f>] __sock_create+0x164/0x250 [<000000004f358332>] __sys_socket+0x69/0x110 [<0000000001588e73>] __x64_sys_socket+0x1e/0x30 [<00000000616e243a>] do_syscall_64+0x73/0x1f0 [<00000000c03632b9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881181ecf00 (size 224): comm "syz-executor173", pid 7053, jiffies 4294943614 (age 13.980s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 a0 be 2a 81 88 ff ff 00 08 0f 1e 81 88 ff ff ...*............ backtrace: [<000000004f74c48e>] kmem_cache_alloc_node+0x163/0x2f0 [<0000000023354df5>] __alloc_skb+0x6e/0x210 [<00000000ac041134>] llc_alloc_frame+0x66/0x110 [<00000000b2c4f564>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000003807aa>] llc_conn_state_process+0x1ac/0x640 [<000000008452d909>] llc_establish_connection+0x110/0x170 [<00000000917ee353>] llc_ui_connect+0x10e/0x370 [<00000000efcc11cf>] __sys_connect+0x11d/0x170 [<00000000af751d01>] __x64_sys_connect+0x1e/0x30 [<00000000616e243a>] do_syscall_64+0x73/0x1f0 [<00000000c03632b9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9