[ 24.634236][ T22] audit: type=1800 audit(1569864066.175:45): pid=6678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 24.656563][ T22] audit: type=1804 audit(1569864066.225:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 24.677401][ T22] audit: type=1804 audit(1569864066.235:47): pid=6844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 24.697960][ T22] audit: type=1804 audit(1569864066.235:48): pid=6843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 24.717587][ T22] audit: type=1804 audit(1569864066.265:49): pid=6844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 24.738812][ T22] audit: type=1804 audit(1569864066.285:50): pid=6843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.22' (ECDSA) to the list of known hosts. syzkaller login: [ 58.610424][ T22] kauditd_printk_skb: 15 callbacks suppressed [ 58.610431][ T22] audit: type=1400 audit(1569864100.175:66): avc: denied { map } for pid=6872 comm="syz-executor729" path="/root/syz-executor729312463" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.856789][ T6872] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888116928400 (size 224): comm "syz-executor729", pid 6876, jiffies 4294945631 (age 54.100s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 60 fe 24 81 88 ff ff 00 70 bb 19 81 88 ff ff .`.$.....p...... backtrace: [<0000000089475a19>] kmem_cache_alloc_node+0x163/0x2f0 [<000000006fa1d937>] __alloc_skb+0x6e/0x210 [<00000000b3e45874>] alloc_skb_with_frags+0x5f/0x250 [<000000003743385e>] sock_alloc_send_pskb+0x269/0x2a0 [<00000000fb15cb59>] sock_alloc_send_skb+0x32/0x40 [<00000000421890ad>] llc_ui_sendmsg+0x10a/0x540 [<00000000d14f7bf4>] sock_sendmsg+0x54/0x70 [<00000000410d9436>] __sys_sendto+0x148/0x1f0 [<00000000c853b5df>] __x64_sys_sendto+0x2a/0x30 [<00000000adf5098d>] do_syscall_64+0x73/0x1f0 [<000000008e332e51>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116928800 (size 224): comm "syz-executor729", pid 6880, jiffies 4294947951 (age 30.900s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 60 fe 24 81 88 ff ff 00 10 9e 24 81 88 ff ff .`.$.......$.... backtrace: [<0000000089475a19>] kmem_cache_alloc_node+0x163/0x2f0 [<000000006fa1d937>] __alloc_skb+0x6e/0x210 [<00000000b3e45874>] alloc_skb_with_frags+0x5f/0x250 [<000000003743385e>] sock_alloc_send_pskb+0x269/0x2a0 [<00000000fb15cb59>] sock_alloc_send_skb+0x32/0x40 [<00000000421890ad>] llc_ui_sendmsg+0x10a/0x540 [<00000000d14f7bf4>] sock_sendmsg+0x54/0x70 [<00000000410d9436>] __sys_sendto+0x148/0x1f0 [<00000000c853b5df>] __x64_sys_sendto+0x2a/0x30 [<00000000adf5098d>] do_syscall_64+0x73/0x1f0 [<000000008e332e51>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888122828c00 (size 512): comm "syz-executor729", pid 6880, jiffies 4294947951 (age 30.900s) hex dump (first 32 bytes): 01 02 05 03 01 00 04 06 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 ce f3 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f447f438>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<000000000d325e07>] __kmalloc_node_track_caller+0x38/0x50 [<0000000031e9a0be>] __kmalloc_reserve.isra.0+0x40/0xb0 [<0000000075757dd1>] __alloc_skb+0xa0/0x210 [<00000000b3e45874>] alloc_skb_with_frags+0x5f/0x250 [<000000003743385e>] sock_alloc_send_pskb+0x269/0x2a0 [<00000000fb15cb59>] sock_alloc_send_skb+0x32/0x40 [<00000000421890ad>] llc_ui_sendmsg+0x10a/0x540 [<00000000d14f7bf4>] sock_sendmsg+0x54/0x70 [<00000000410d9436>] __sys_sendto+0x148/0x1f0 [<00000000c853b5df>] __x64_sys_sendto+0x2a/0x30 [<00000000adf5098d>] do_syscall_64+0x73/0x1f0 [<000000008e332e51>] entry_SYSCALL_64_after_hwframe+0x44/0xa9