Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 26.320424][ T24] audit: type=1800 audit(1562528659.345:33): pid=6736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 26.342787][ T24] audit: type=1800 audit(1562528659.345:34): pid=6736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 27.059336][ T24] audit: type=1400 audit(1562528660.085:35): avc: denied { map } for pid=6905 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.194' (ECDSA) to the list of known hosts. syzkaller login: [ 120.060993][ T24] audit: type=1400 audit(1562528753.085:36): avc: denied { map } for pid=6921 comm="syz-executor113" path="/root/syz-executor113162439" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 126.734714][ T6922] IPVS: ftp: loaded support on port[0] = 21 [ 126.754968][ T6922] chnl_net:caif_netlink_parms(): no params data found [ 126.767340][ T6922] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.774636][ T6922] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.781948][ T6922] device bridge_slave_0 entered promiscuous mode [ 126.788949][ T6922] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.796055][ T6922] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.803252][ T6922] device bridge_slave_1 entered promiscuous mode [ 126.812967][ T6922] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 126.821644][ T6922] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 126.832429][ T6922] team0: Port device team_slave_0 added [ 126.838355][ T6922] team0: Port device team_slave_1 added [ 126.875239][ T6922] device hsr_slave_0 entered promiscuous mode [ 126.914647][ T6922] device hsr_slave_1 entered promiscuous mode [ 126.956678][ T6922] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.964894][ T6922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.972730][ T6922] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.980484][ T6922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.995361][ T6922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.004837][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.022854][ T16] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.032279][ T16] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.039785][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 127.048115][ T6922] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.055672][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.063855][ T3002] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.070896][ T3002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.079187][ T6924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.087591][ T6924] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.094800][ T6924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.104920][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 127.113286][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 127.121356][ T6924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.130390][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.139215][ T6924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.147754][ T6922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready executing program [ 127.157771][ T6922] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 128.284821][ T2667] device bridge_slave_1 left promiscuous mode [ 128.294869][ T2667] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.344779][ T2667] device bridge_slave_0 left promiscuous mode [ 128.354212][ T2667] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.515468][ T2667] device hsr_slave_1 left promiscuous mode [ 128.555677][ T2667] device hsr_slave_0 left promiscuous mode [ 128.595383][ T2667] team0 (unregistering): Port device team_slave_1 removed [ 128.608714][ T2667] team0 (unregistering): Port device team_slave_0 removed [ 128.619576][ T2667] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 128.675208][ T2667] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 128.718491][ T2667] bond0 (unregistering): Released all slaves [ 132.966959][ T6921] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 134.810448][ T6921] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811fa9c240 (size 64): comm "softirq", pid 0, jiffies 4294949949 (age 8.110s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 e0 ec f7 20 81 88 ff ff ........... .... 00 00 00 00 00 00 00 00 30 10 16 83 ff ff ff ff ........0....... backtrace: [<0000000065839f85>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000c91dd259>] batadv_tvlv_handler_register+0xae/0x140 [<00000000eb748fc5>] batadv_tt_init+0x78/0x180 [<00000000ba27d9c8>] batadv_mesh_init+0x196/0x230 [<0000000078ead03c>] batadv_softif_init_late+0x1ca/0x220 [<00000000430e8be5>] register_netdevice+0xbf/0x600 [<000000001f9b0ccb>] __rtnl_newlink+0xaca/0xb30 [<00000000b598ab9c>] rtnl_newlink+0x4e/0x80 [<000000001bb512c6>] rtnetlink_rcv_msg+0x178/0x4b0 [<00000000a499a246>] netlink_rcv_skb+0x61/0x170 [<0000000081f09860>] rtnetlink_rcv+0x1d/0x30 [<00000000cba53771>] netlink_unicast+0x1ec/0x2d0 [<0000000037dc89b2>] netlink_sendmsg+0x26a/0x480 [<00000000b0f29742>] sock_sendmsg+0x54/0x70 [<00000000b3e1ff12>] __sys_sendto+0x148/0x1f0 [<000000007978e75c>] __x64_sys_sendto+0x2a/0x30 BUG: memory leak unreferenced object 0xffff888124381600 (size 128): comm "syz-executor113", pid 6922, jiffies 4294949958 (age 8.020s) hex dump (first 32 bytes): f0 18 d1 0c 81 88 ff ff f0 18 d1 0c 81 88 ff ff ................ 96 97 37 1c ae 2d 82 10 36 b4 b7 bb 00 00 ad de ..7..-..6....... backtrace: [<0000000065839f85>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000cda24b98>] hsr_create_self_node+0x42/0x150 [<00000000570fba27>] hsr_dev_finalize+0xa4/0x233 [<00000000a8adc2c0>] hsr_newlink+0xf3/0x140 [<000000000a0172ab>] __rtnl_newlink+0x892/0xb30 [<00000000b598ab9c>] rtnl_newlink+0x4e/0x80 [<000000001bb512c6>] rtnetlink_rcv_msg+0x178/0x4b0 [<00000000a499a246>] netlink_rcv_skb+0x61/0x170 [<0000000081f09860>] rtnetlink_rcv+0x1d/0x30 [<00000000cba53771>] netlink_unicast+0x1ec/0x2d0 [<0000000037dc89b2>] netlink_sendmsg+0x26a/0x480 [<00000000b0f29742>] sock_sendmsg+0x54/0x70 [<00000000b3e1ff12>] __sys_sendto+0x148/0x1f0 [<000000007978e75c>] __x64_sys_sendto+0x2a/0x30 [<00000000313414a1>] do_syscall_64+0x76/0x1a0 [<000000004e3b3dee>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116a30140 (size 64): comm "syz-executor113", pid 6922, jiffies 4294949958 (age 8.020s) hex dump (first 32 bytes): 80 a9 ef 1e 81 88 ff ff 00 02 00 00 00 00 ad de ................ 00 10 d1 0c 81 88 ff ff c0 18 d1 0c 81 88 ff ff ................ backtrace: [<0000000065839f85>] kmem_cache_alloc_trace+0x13d/0x280 [<000000005ff5c3f6>] hsr_add_port+0xe7/0x220 [<00000000639125c6>] hsr_dev_finalize+0x14f/0x233 [<00000000a8adc2c0>] hsr_newlink+0xf3/0x140 [<000000000a0172ab>] __rtnl_newlink+0x892/0xb30 [<00000000b598ab9c>] rtnl_newlink+0x4e/0x80 [<000000001bb512c6>] rtnetlink_rcv_msg+0x178/0x4b0 [<00000000a499a246>] netlink_rcv_skb+0x61/0x170 [<0000000081f09860>] rtnetlink_rcv+0x1d/0x30 [<00000000cba53771>] netlink_unicast+0x1ec/0x2d0 [<0000000037dc89b2>] netlink_sendmsg+0x26a/0x480 [<00000000b0f29742>] sock_sendmsg+0x54/0x70 [<00000000b3e1ff12>] __sys_sendto+0x148/0x1f0 [<000000007978e75c>] __x64_sys_sendto+0x2a/0x30 [<00000000313414a1>] do_syscall_64+0x76/0x1a0 [<000000004e3b3dee>] entry_SYSCALL_64_after_hwframe+0x44/0xa9