[ 28.245828][ T25] audit: type=1800 audit(1569479991.756:45): pid=6847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 28.279165][ T25] audit: type=1804 audit(1569479991.816:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 28.300021][ T25] audit: type=1804 audit(1569479991.836:47): pid=7037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 28.320435][ T25] audit: type=1804 audit(1569479991.836:48): pid=7039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 28.341195][ T25] audit: type=1804 audit(1569479991.876:49): pid=7035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 28.361687][ T25] audit: type=1804 audit(1569479991.876:50): pid=7037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.45' (ECDSA) to the list of known hosts. syzkaller login: [ 85.670055][ T25] kauditd_printk_skb: 14 callbacks suppressed [ 85.670064][ T25] audit: type=1400 audit(1569480049.206:65): avc: denied { map } for pid=7065 comm="syz-executor921" path="/root/syz-executor921275800" dev="sda1" ino=16461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 101.683419][ T7065] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810bd3c300 (size 224): comm "syz-executor921", pid 7066, jiffies 4294946527 (age 11.020s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 b0 56 2a 81 88 ff ff 00 c8 f3 11 81 88 ff ff ..V*............ backtrace: [<0000000061ba0dff>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000dfe1d9b2>] __alloc_skb+0x6e/0x210 [<00000000b372ca58>] llc_alloc_frame+0x66/0x110 [<00000000ec239ae3>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<000000000410e853>] llc_conn_state_process+0x1ac/0x640 [<0000000045eb27d4>] llc_establish_connection+0x110/0x170 [<0000000010a1f2d5>] llc_ui_connect+0x10e/0x370 [<0000000026b631f3>] __sys_connect+0x11d/0x170 [<00000000a57849f4>] __x64_sys_connect+0x1e/0x30 [<00000000652692e7>] do_syscall_64+0x73/0x1f0 [<0000000010644e70>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810bd3c200 (size 224): comm "softirq", pid 0, jiffies 4294946632 (age 9.970s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 b0 56 2a 81 88 ff ff 00 c8 f3 11 81 88 ff ff ..V*............ backtrace: [<0000000061ba0dff>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000dfe1d9b2>] __alloc_skb+0x6e/0x210 [<00000000b372ca58>] llc_alloc_frame+0x66/0x110 [<00000000ec239ae3>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<000000000410e853>] llc_conn_state_process+0x1ac/0x640 [<00000000b1960d7d>] llc_conn_tmr_common_cb+0xe0/0x1b0 [<00000000a6a627a7>] llc_conn_ack_tmr_cb+0x1e/0x30 [<00000000be01c9af>] call_timer_fn+0x45/0x1e0 [<000000008da3ed5e>] run_timer_softirq+0x25f/0x750 [<000000002d38eb9f>] __do_softirq+0x115/0x33f [<00000000eb23eed6>] irq_exit+0xbb/0xe0 [<00000000f594447b>] smp_apic_timer_interrupt+0x96/0x190 [<00000000cfa107ed>] apic_timer_interrupt+0xf/0x20 [<00000000bc67b484>] native_safe_halt+0xe/0x10 [<000000004701c149>] arch_cpu_idle+0xa/0x10 [<000000002d56312c>] default_idle_call+0x1e/0x40 BUG: memory leak unreferenced object 0xffff88810bd3c100 (size 224): comm "softirq", pid 0, jiffies 4294946736 (age 8.930s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 b0 56 2a 81 88 ff ff 00 c8 f3 11 81 88 ff ff ..V*............ backtrace: [<0000000061ba0dff>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000dfe1d9b2>] __alloc_skb+0x6e/0x210 [<00000000b372ca58>] llc_alloc_frame+0x66/0x110 [<00000000ec239ae3>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<000000000410e853>] llc_conn_state_process+0x1ac/0x640 [<00000000b1960d7d>] llc_conn_tmr_common_cb+0xe0/0x1b0 [<00000000a6a627a7>] llc_conn_ack_tmr_cb+0x1e/0x30 [<00000000be01c9af>] call_timer_fn+0x45/0x1e0 [<000000008da3ed5e>] run_timer_softirq+0x25f/0x750 [<000000002d38eb9f>] __do_softirq+0x115/0x33f [<00000000eb23eed6>] irq_exit+0xbb/0xe0 [<00000000f594447b>] smp_apic_timer_interrupt+0x96/0x190 [<00000000cfa107ed>] apic_timer_interrupt+0xf/0x20 [<00000000bc67b484>] native_safe_halt+0xe/0x10 [<000000004701c149>] arch_cpu_idle+0xa/0x10 [<000000002d56312c>] default_idle_call+0x1e/0x40