[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 27.647540][ T24] audit: type=1800 audit(1559847855.605:33): pid=6880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 27.670773][ T24] audit: type=1800 audit(1559847855.605:34): pid=6880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 52.730668][ T24] audit: type=1400 audit(1559847880.685:35): avc: denied { map } for pid=7084 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.54' (ECDSA) to the list of known hosts. [ 58.595053][ T24] audit: type=1400 audit(1559847886.555:36): avc: denied { map } for pid=7096 comm="syz-executor290" path="/root/syz-executor290348671" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 65.459331][ T7097] IPVS: ftp: loaded support on port[0] = 21 [ 65.478960][ T7097] chnl_net:caif_netlink_parms(): no params data found [ 65.490938][ T7097] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.498376][ T7097] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.506068][ T7097] device bridge_slave_0 entered promiscuous mode [ 65.513042][ T7097] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.520086][ T7097] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.528037][ T7097] device bridge_slave_1 entered promiscuous mode [ 65.537097][ T7097] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 65.545976][ T7097] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 65.557030][ T7097] team0: Port device team_slave_0 added [ 65.563223][ T7097] team0: Port device team_slave_1 added [ 65.613356][ T7097] device hsr_slave_0 entered promiscuous mode [ 65.652499][ T7097] device hsr_slave_1 entered promiscuous mode [ 65.704670][ T7097] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.711713][ T7097] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.718970][ T7097] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.726133][ T7097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.741031][ T7097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.749287][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.767215][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.775720][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.783204][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 65.791853][ T7097] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.800227][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.808809][ T2969] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.815845][ T2969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.829101][ T7097] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 65.839561][ T7097] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 65.850852][ T7099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.859314][ T7099] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.866436][ T7099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.874245][ T7099] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.882921][ T7099] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.891214][ T7099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready executing program [ 65.899463][ T7099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.907538][ T7099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.915056][ T7099] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.925908][ T7097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.733073][ T26] device bridge_slave_1 left promiscuous mode [ 66.739332][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.852784][ T26] device bridge_slave_0 left promiscuous mode [ 66.859102][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.143610][ T26] device hsr_slave_1 left promiscuous mode [ 67.202995][ T26] device hsr_slave_0 left promiscuous mode [ 67.263074][ T26] team0 (unregistering): Port device team_slave_1 removed [ 67.270887][ T26] team0 (unregistering): Port device team_slave_0 removed [ 67.278799][ T26] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 67.333020][ T26] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 67.376680][ T26] bond0 (unregistering): Released all slaves [ 71.853967][ T7096] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881162fad80 (size 128): comm "syz-executor290", pid 7097, jiffies 4294943825 (age 8.210s) hex dump (first 32 bytes): f0 58 27 16 81 88 ff ff f0 58 27 16 81 88 ff ff .X'......X'..... be e9 d7 e8 71 f5 ca f1 90 3e 36 f9 ff ff ff ff ....q....>6..... backtrace: [<000000002082649e>] kmem_cache_alloc_trace+0x13d/0x280 [<0000000020238602>] hsr_create_self_node+0x42/0x150 [<000000007a76cf66>] hsr_dev_finalize+0xa4/0x233 [<0000000029b81039>] hsr_newlink+0xf3/0x140 [<000000007917e230>] __rtnl_newlink+0x892/0xb30 [<0000000025495afa>] rtnl_newlink+0x4e/0x80 [<00000000ce63ef98>] rtnetlink_rcv_msg+0x178/0x4b0 [<00000000cf3f099c>] netlink_rcv_skb+0x61/0x170 [<00000000014b5389>] rtnetlink_rcv+0x1d/0x30 [<00000000860e50ff>] netlink_unicast+0x1ec/0x2d0 [<00000000380e2f4e>] netlink_sendmsg+0x26a/0x480 [<00000000e45e8183>] sock_sendmsg+0x54/0x70 [<00000000f6a70b8f>] __sys_sendto+0x148/0x1f0 [<00000000f6e17f36>] __x64_sys_sendto+0x2a/0x30 [<000000008c212dc2>] do_syscall_64+0x76/0x1a0 [<0000000090cb5d2f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888109154bc0 (size 64): comm "syz-executor290", pid 7097, jiffies 4294943825 (age 8.210s) hex dump (first 32 bytes): 00 6f 95 0d 81 88 ff ff 00 02 00 00 00 00 ad de .o.............. 00 50 27 16 81 88 ff ff c0 58 27 16 81 88 ff ff .P'......X'..... backtrace: [<000000002082649e>] kmem_cache_alloc_trace+0x13d/0x280 [<000000006a6ad356>] hsr_add_port+0xe7/0x220 [<000000003c8d6a36>] hsr_dev_finalize+0x14f/0x233 [<0000000029b81039>] hsr_newlink+0xf3/0x140 [<000000007917e230>] __rtnl_newlink+0x892/0xb30 [<0000000025495afa>] rtnl_newlink+0x4e/0x80 [<00000000ce63ef98>] rtnetlink_rcv_msg+0x178/0x4b0 [<00000000cf3f099c>] netlink_rcv_skb+0x61/0x170 [<00000000014b5389>] rtnetlink_rcv+0x1d/0x30 [<00000000860e50ff>] netlink_unicast+0x1ec/0x2d0 [<00000000380e2f4e>] netlink_sendmsg+0x26a/0x480 [<00000000e45e8183>] sock_sendmsg+0x54/0x70 [<00000000f6a70b8f>] __sys_sendto+0x148/0x1f0 [<00000000f6e17f36>] __x64_sys_sendto+0x2a/0x30 [<000000008c212dc2>] do_syscall_64+0x76/0x1a0 [<0000000090cb5d2f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810d956f00 (size 64): comm "syz-executor290", pid 7097, jiffies 4294943830 (age 8.160s) hex dump (first 32 bytes): d0 58 27 16 81 88 ff ff 00 02 00 00 00 00 ad de .X'............. 00 30 cb 23 81 88 ff ff c0 58 27 16 81 88 ff ff .0.#.....X'..... backtrace: [<000000002082649e>] kmem_cache_alloc_trace+0x13d/0x280 [<000000006a6ad356>] hsr_add_port+0xe7/0x220 [<0000000078ab58da>] hsr_dev_finalize+0x1d1/0x233 [<0000000029b81039>] hsr_newlink+0xf3/0x140 [<000000007917e230>] __rtnl_newlink+0x892/0xb30 [<0000000025495afa>] rtnl_newlink+0x4e/0x80 [<00000000ce63ef98>] rtnetlink_rcv_msg+0x178/0x4b0 [<00000000cf3f099c>] netlink_rcv_skb+0x61/0x170 [<00000000014b5389>] rtnetlink_rcv+0x1d/0x30 [<00000000860e50ff>] netlink_unicast+0x1ec/0x2d0 [<00000000380e2f4e>] netlink_sendmsg+0x26a/0x480 [<00000000e45e8183>] sock_sendmsg+0x54/0x70 [<00000000f6a70b8f>] __sys_sendto+0x148/0x1f0 [<00000000f6e17f36>] __x64_sys_sendto+0x2a/0x30 [<000000008c212dc2>] do_syscall_64+0x76/0x1a0 [<0000000090cb5d2f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9