Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 25.215677][ T24] audit: type=1800 audit(1562294547.071:33): pid=6829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 25.242913][ T24] audit: type=1800 audit(1562294547.071:34): pid=6829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.152072][ T24] audit: type=1400 audit(1562294550.011:35): avc: denied { map } for pid=7007 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.66' (ECDSA) to the list of known hosts. [ 63.796482][ T24] audit: type=1400 audit(1562294585.651:36): avc: denied { map } for pid=7023 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/07/05 02:43:06 parsed 1 programs [ 64.913029][ T24] audit: type=1400 audit(1562294586.771:37): avc: denied { map } for pid=7023 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16188 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 64.914655][ T3775] kmemleak: Automatic memory scanning thread ended 2019/07/05 02:43:15 executed programs: 0 [ 73.755967][ T7039] IPVS: ftp: loaded support on port[0] = 21 [ 73.777066][ T7039] chnl_net:caif_netlink_parms(): no params data found [ 73.790432][ T7039] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.798350][ T7039] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.806704][ T7039] device bridge_slave_0 entered promiscuous mode [ 73.814634][ T7039] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.822113][ T7039] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.830063][ T7039] device bridge_slave_1 entered promiscuous mode [ 73.839815][ T7039] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.849171][ T7039] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.861002][ T7039] team0: Port device team_slave_0 added [ 73.867527][ T7039] team0: Port device team_slave_1 added [ 73.900262][ T7039] device hsr_slave_0 entered promiscuous mode [ 73.939432][ T7039] device hsr_slave_1 entered promiscuous mode [ 73.991655][ T7039] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.999650][ T7039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.007814][ T7039] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.015026][ T7039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.029724][ T7039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.038562][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.047345][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.055941][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.064889][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 74.074870][ T7039] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.093458][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.102398][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.109571][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.121743][ T7039] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 74.132444][ T7039] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.144119][ T7043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.153196][ T7043] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.163743][ T7043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.171834][ T7043] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.180712][ T7043] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.189965][ T7043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.198336][ T7043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.206669][ T7043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 74.214423][ T7043] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 74.224989][ T7039] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.243613][ T24] audit: type=1400 audit(1562294596.101:38): avc: denied { associate } for pid=7039 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 74.275831][ T7049] FAULT_INJECTION: forcing a failure. [ 74.275831][ T7049] name failslab, interval 1, probability 0, space 0, times 1 [ 74.288996][ T7049] CPU: 1 PID: 7049 Comm: syz-executor.0 Not tainted 5.2.0-rc7+ #51 [ 74.297190][ T7049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.307785][ T7049] Call Trace: [ 74.311235][ T7049] dump_stack+0xaa/0xd6 [ 74.316611][ T7049] should_fail.cold+0x3c/0x49 [ 74.321288][ T7049] __should_failslab+0x65/0xa0 [ 74.326170][ T7049] should_failslab+0x9/0x14 [ 74.331061][ T7049] kmem_cache_alloc+0x26/0x270 [ 74.335820][ T7049] security_inode_alloc+0x33/0xb0 [ 74.340919][ T7049] inode_init_always+0x108/0x200 [ 74.346126][ T7049] alloc_inode+0x49/0xe0 [ 74.350343][ T7049] new_inode_pseudo+0x18/0x70 [ 74.355147][ T7049] sock_alloc+0x1c/0x90 [ 74.359390][ T7049] __sock_create+0x8f/0x250 [ 74.364028][ T7049] __sys_socket+0x69/0x110 [ 74.368520][ T7049] __x64_sys_socket+0x1e/0x30 [ 74.373457][ T7049] do_syscall_64+0x76/0x1a0 [ 74.378187][ T7049] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 74.384426][ T7049] RIP: 0033:0x4597c9 [ 74.389008][ T7049] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 74.409857][ T7049] RSP: 002b:00007ffe1e635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 74.418626][ T7049] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004597c9 [ 74.427215][ T7049] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 0000000000000027 [ 74.435376][ T7049] RBP: 000000000075bf20 R08: 0000000000000000 R09: 00007ffe1e635cc0 [ 74.443803][ T7049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000555556895914 [ 74.452130][ T7049] R13: 00000000004c8646 R14: 00000000004df230 R15: 0000000000000003 [ 74.460812][ T7049] socket: no more sockets 2019/07/05 02:43:21 executed programs: 1 [ 79.613563][ T7053] FAULT_INJECTION: forcing a failure. [ 79.613563][ T7053] name failslab, interval 1, probability 0, space 0, times 0 [ 79.626328][ T7053] CPU: 0 PID: 7053 Comm: syz-executor.0 Not tainted 5.2.0-rc7+ #51 [ 79.634218][ T7053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.644248][ T7053] Call Trace: [ 79.647522][ T7053] dump_stack+0xaa/0xd6 [ 79.651675][ T7053] should_fail.cold+0x3c/0x49 [ 79.656351][ T7053] __should_failslab+0x65/0xa0 [ 79.661120][ T7053] should_failslab+0x9/0x14 [ 79.665616][ T7053] kmem_cache_alloc+0x26/0x270 [ 79.670383][ T7053] ? __fget+0xbc/0xf0 [ 79.674339][ T7053] create_new_namespaces+0x33/0x2a0 [ 79.679526][ T7053] __x64_sys_setns+0xb3/0x130 [ 79.684199][ T7053] do_syscall_64+0x76/0x1a0 [ 79.689019][ T7053] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 79.694984][ T7053] RIP: 0033:0x45c2b7 [ 79.698856][ T7053] Code: 00 66 90 b8 10 01 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 34 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 dd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 79.718866][ T7053] RSP: 002b:00007ffe1e635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000134 [ 79.727368][ T7053] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045c2b7 [ 79.735457][ T7053] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000004 [ 79.743520][ T7053] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ffe1e635cc0 [ 79.751626][ T7053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000555556895914 [ 79.759676][ T7053] R13: 0000000000000000 R14: 00000000004df230 R15: 0000000000000003 2019/07/05 02:43:21 result: hanged=false err=executor 0: exit status 67 setns(netns) failed (errno 12) child failed (errno 0) loop exited with status 67 setns(netns) failed (errno 12) child failed (errno 0) loop exited with status 67 [ 79.866632][ T7055] IPVS: ftp: loaded support on port[0] = 21 [ 79.885028][ T7055] chnl_net:caif_netlink_parms(): no params data found [ 79.896982][ T7055] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.904417][ T7055] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.912297][ T7055] device bridge_slave_0 entered promiscuous mode [ 79.927757][ T7055] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.934888][ T7055] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.942259][ T7055] device bridge_slave_1 entered promiscuous mode [ 79.951478][ T7055] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 79.960294][ T7055] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 79.975416][ T7055] team0: Port device team_slave_0 added [ 79.981476][ T7055] team0: Port device team_slave_1 added [ 80.020043][ T7055] device hsr_slave_0 entered promiscuous mode [ 80.059521][ T7055] device hsr_slave_1 entered promiscuous mode [ 80.105340][ T7055] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.112398][ T7055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.119791][ T7055] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.126805][ T7055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.140684][ T7055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.149043][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.156939][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.165065][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.177717][ T7055] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.185348][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 80.193511][ T3519] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.200529][ T3519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.208960][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 80.217570][ T3040] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.225000][ T3040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.242671][ T7055] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 80.253573][ T7055] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 80.265625][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 80.273844][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 80.282278][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 80.290759][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 80.298731][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 80.306156][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 80.320772][ T7055] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 80.340199][ T7061] FAULT_INJECTION: forcing a failure. [ 80.340199][ T7061] name failslab, interval 1, probability 0, space 0, times 0 [ 80.352944][ T7061] CPU: 1 PID: 7061 Comm: syz-executor.0 Not tainted 5.2.0-rc7+ #51 [ 80.360807][ T7061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.370840][ T7061] Call Trace: [ 80.374111][ T7061] dump_stack+0xaa/0xd6 [ 80.378247][ T7061] should_fail.cold+0x3c/0x49 [ 80.383004][ T7061] __should_failslab+0x65/0xa0 [ 80.387745][ T7061] should_failslab+0x9/0x14 [ 80.392220][ T7061] kmem_cache_alloc+0x26/0x270 [ 80.397095][ T7061] ebitmap_cpy+0x6b/0x120 [ 80.401417][ T7061] mls_compute_sid+0x104/0x330 [ 80.406155][ T7061] security_compute_sid.part.0+0x3db/0x790 [ 80.411934][ T7061] ? selinux_netlbl_sk_security_reset+0xd/0x20 [ 80.418058][ T7061] security_transition_sid+0x99/0xc0 [ 80.423322][ T7061] selinux_socket_post_create+0x2c3/0x380 [ 80.429011][ T7061] security_socket_post_create+0x59/0x80 [ 80.434704][ T7061] __sock_create+0x1f8/0x250 [ 80.439284][ T7061] __sys_socket+0x69/0x110 [ 80.443703][ T7061] __x64_sys_socket+0x1e/0x30 [ 80.448586][ T7061] do_syscall_64+0x76/0x1a0 [ 80.453171][ T7061] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.459292][ T7061] RIP: 0033:0x4597c9 [ 80.463165][ T7061] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 80.482769][ T7061] RSP: 002b:00007ffef8a75dd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 80.491156][ T7061] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004597c9 [ 80.499102][ T7061] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 0000000000000027 [ 80.507046][ T7061] RBP: 000000000075bf20 R08: 0000000000000000 R09: 00007ffef8a75e20 [ 80.515009][ T7061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000555556f3b914 [ 80.523002][ T7061] R13: 00000000004c8646 R14: 00000000004df230 R15: 0000000000000003 [ 80.840493][ T7] device bridge_slave_1 left promiscuous mode [ 80.847054][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.900366][ T7] device bridge_slave_0 left promiscuous mode [ 80.906541][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.321644][ T7] device hsr_slave_1 left promiscuous mode [ 81.350490][ T7] device hsr_slave_0 left promiscuous mode [ 81.440676][ T7] team0 (unregistering): Port device team_slave_1 removed [ 81.449100][ T7] team0 (unregistering): Port device team_slave_0 removed [ 81.457649][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 81.550632][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 81.594657][ T7] bond0 (unregistering): Released all slaves 2019/07/05 02:43:27 executed programs: 3 [ 86.778788][ T7068] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888112b2f740 (size 64): comm "softirq", pid 0, jiffies 4294944644 (age 20.110s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 e0 9c 7b 1d 81 88 ff ff ..........{..... 00 00 00 00 00 00 00 00 e0 c3 15 83 ff ff ff ff ................ backtrace: [<0000000056b0eaea>] kmem_cache_alloc_trace+0x13d/0x280 [<0000000066dd6939>] batadv_tvlv_handler_register+0xae/0x140 [<000000003dfcf00f>] batadv_tt_init+0x78/0x180 [<00000000f0c0a77d>] batadv_mesh_init+0x196/0x230 [<000000009d16e7c9>] batadv_softif_init_late+0x1ca/0x220 [<0000000066cb3360>] register_netdevice+0xbf/0x600 [<000000008f06e751>] __rtnl_newlink+0xaca/0xb30 [<00000000c583cb65>] rtnl_newlink+0x4e/0x80 [<000000005d222ec5>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000000d3437f0>] netlink_rcv_skb+0x61/0x170 [<000000004ea31401>] rtnetlink_rcv+0x1d/0x30 [<00000000a93f5cd4>] netlink_unicast+0x1ec/0x2d0 [<00000000da4ac28c>] netlink_sendmsg+0x26a/0x480 [<00000000242f860f>] sock_sendmsg+0x54/0x70 [<0000000061f4b745>] __sys_sendto+0x148/0x1f0 [<00000000d3f55a70>] __x64_sys_sendto+0x2a/0x30 BUG: memory leak unreferenced object 0xffff888120784e00 (size 128): comm "syz-executor.0", pid 7039, jiffies 4294944653 (age 20.020s) hex dump (first 32 bytes): f0 78 1c 21 81 88 ff ff f0 78 1c 21 81 88 ff ff .x.!.....x.!.... f2 ca 0a d8 f1 a9 3a eb b1 f2 e7 e3 48 8b 85 48 ......:.....H..H backtrace: [<0000000056b0eaea>] kmem_cache_alloc_trace+0x13d/0x280 [<000000007a2d25d2>] hsr_create_self_node+0x42/0x150 [<00000000c91a0e8f>] hsr_dev_finalize+0xa4/0x233 [<00000000250d1332>] hsr_newlink+0xf3/0x140 [<00000000aaac207e>] __rtnl_newlink+0x892/0xb30 [<00000000c583cb65>] rtnl_newlink+0x4e/0x80 [<000000005d222ec5>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000000d3437f0>] netlink_rcv_skb+0x61/0x170 [<000000004ea31401>] rtnetlink_rcv+0x1d/0x30 [<00000000a93f5cd4>] netlink_unicast+0x1ec/0x2d0 [<00000000da4ac28c>] netlink_sendmsg+0x26a/0x480 [<00000000242f860f>] sock_sendmsg+0x54/0x70 [<0000000061f4b745>] __sys_sendto+0x148/0x1f0 [<00000000d3f55a70>] __x64_sys_sendto+0x2a/0x30 [<00000000642fa19e>] do_syscall_64+0x76/0x1a0 [<00000000a505e3df>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888122b90300 (size 64): comm "syz-executor.0", pid 7039, jiffies 4294944653 (age 20.020s) hex dump (first 32 bytes): 40 73 b9 2a 81 88 ff ff 00 02 00 00 00 00 ad de @s.*............ 00 70 1c 21 81 88 ff ff c0 78 1c 21 81 88 ff ff .p.!.....x.!.... backtrace: [<0000000056b0eaea>] kmem_cache_alloc_trace+0x13d/0x280 [<0000000088ae804f>] hsr_add_port+0xe7/0x220 [<0000000056f9efc0>] hsr_dev_finalize+0x14f/0x233 [<00000000250d1332>] hsr_newlink+0xf3/0x140 [<00000000aaac207e>] __rtnl_newlink+0x892/0xb30 [<00000000c583cb65>] rtnl_newlink+0x4e/0x80 [<000000005d222ec5>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000000d3437f0>] netlink_rcv_skb+0x61/0x170 [<000000004ea31401>] rtnetlink_rcv+0x1d/0x30 [<00000000a93f5cd4>] netlink_unicast+0x1ec/0x2d0 [<00000000da4ac28c>] netlink_sendmsg+0x26a/0x480 [<00000000242f860f>] sock_sendmsg+0x54/0x70 [<0000000061f4b745>] __sys_sendto+0x148/0x1f0 [<00000000d3f55a70>] __x64_sys_sendto+0x2a/0x30 [<00000000642fa19e>] do_syscall_64+0x76/0x1a0 [<00000000a505e3df>] entry_SYSCALL_64_after_hwframe+0x44/0xa9