[ 23.957010][ T24] audit: type=1800 audit(1574971421.514:40): pid=6757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 27.347096][ T24] audit: type=1400 audit(1574971424.924:41): avc: denied { map } for pid=6935 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.8' (ECDSA) to the list of known hosts. [ 33.457653][ T24] audit: type=1400 audit(1574971431.034:42): avc: denied { map } for pid=6949 comm="syz-executor255" path="/root/syz-executor255488758" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program [ 46.922250][ T6959] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811736a900 (size 64): comm "syz-executor255", pid 6961, jiffies 4294941312 (age 18.230s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10 a9 36 17 81 88 ff ff 10 a9 36 17 81 88 ff ff ..6.......6..... backtrace: [<000000000bce4d97>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005351be03>] netdev_name_node_alloc+0x2a/0x70 [<00000000e51ce12a>] register_netdevice+0xaf/0x650 [<000000001e7bad43>] bond_newlink+0x41/0x80 [<00000000651af2f0>] __rtnl_newlink+0x89a/0xb80 [<00000000360e9df5>] rtnl_newlink+0x4e/0x80 [<00000000e011064d>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007efb805f>] netlink_rcv_skb+0x61/0x170 [<00000000bbcbc561>] rtnetlink_rcv+0x1d/0x30 [<00000000cf032e1c>] netlink_unicast+0x223/0x310 [<000000008792feaf>] netlink_sendmsg+0x29f/0x550 [<00000000a2c65b59>] sock_sendmsg+0x54/0x70 [<000000005b5b243c>] ___sys_sendmsg+0x393/0x3c0 [<000000000b7158e8>] __sys_sendmsg+0x80/0xf0 [<00000000e52f982c>] __x64_sys_sendmsg+0x23/0x30 [<00000000a4e97677>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff888115549040 (size 64): comm "syz-executor255", pid 6968, jiffies 4294941312 (age 18.230s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 50 90 54 15 81 88 ff ff 50 90 54 15 81 88 ff ff P.T.....P.T..... backtrace: [<000000000bce4d97>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005351be03>] netdev_name_node_alloc+0x2a/0x70 [<00000000e51ce12a>] register_netdevice+0xaf/0x650 [<000000001e7bad43>] bond_newlink+0x41/0x80 [<00000000651af2f0>] __rtnl_newlink+0x89a/0xb80 [<00000000360e9df5>] rtnl_newlink+0x4e/0x80 [<00000000e011064d>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007efb805f>] netlink_rcv_skb+0x61/0x170 [<00000000bbcbc561>] rtnetlink_rcv+0x1d/0x30 [<00000000cf032e1c>] netlink_unicast+0x223/0x310 [<000000008792feaf>] netlink_sendmsg+0x29f/0x550 [<00000000a2c65b59>] sock_sendmsg+0x54/0x70 [<000000005b5b243c>] ___sys_sendmsg+0x393/0x3c0 [<000000000b7158e8>] __sys_sendmsg+0x80/0xf0 [<00000000e52f982c>] __x64_sys_sendmsg+0x23/0x30 [<00000000a4e97677>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff88811736a900 (size 64): comm "syz-executor255", pid 6961, jiffies 4294941312 (age 19.240s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10 a9 36 17 81 88 ff ff 10 a9 36 17 81 88 ff ff ..6.......6..... backtrace: [<000000000bce4d97>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005351be03>] netdev_name_node_alloc+0x2a/0x70 [<00000000e51ce12a>] register_netdevice+0xaf/0x650 [<000000001e7bad43>] bond_newlink+0x41/0x80 [<00000000651af2f0>] __rtnl_newlink+0x89a/0xb80 [<00000000360e9df5>] rtnl_newlink+0x4e/0x80 [<00000000e011064d>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007efb805f>] netlink_rcv_skb+0x61/0x170 [<00000000bbcbc561>] rtnetlink_rcv+0x1d/0x30 [<00000000cf032e1c>] netlink_unicast+0x223/0x310 [<000000008792feaf>] netlink_sendmsg+0x29f/0x550 [<00000000a2c65b59>] sock_sendmsg+0x54/0x70 [<000000005b5b243c>] ___sys_sendmsg+0x393/0x3c0 [<000000000b7158e8>] __sys_sendmsg+0x80/0xf0 [<00000000e52f982c>] __x64_sys_sendmsg+0x23/0x30 [<00000000a4e97677>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff888115549040 (size 64): comm "syz-executor255", pid 6968, jiffies 4294941312 (age 19.240s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 50 90 54 15 81 88 ff ff 50 90 54 15 81 88 ff ff P.T.....P.T..... backtrace: [<000000000bce4d97>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005351be03>] netdev_name_node_alloc+0x2a/0x70 [<00000000e51ce12a>] register_netdevice+0xaf/0x650 [<000000001e7bad43>] bond_newlink+0x41/0x80 [<00000000651af2f0>] __rtnl_newlink+0x89a/0xb80 [<00000000360e9df5>] rtnl_newlink+0x4e/0x80 [<00000000e011064d>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007efb805f>] netlink_rcv_skb+0x61/0x170 [<00000000bbcbc561>] rtnetlink_rcv+0x1d/0x30 [<00000000cf032e1c>] netlink_unicast+0x223/0x310 [<000000008792feaf>] netlink_sendmsg+0x29f/0x550 [<00000000a2c65b59>] sock_sendmsg+0x54/0x70 [<000000005b5b243c>] ___sys_sendmsg+0x393/0x3c0 [<000000000b7158e8>] __sys_sendmsg+0x80/0xf0 [<00000000e52f982c>] __x64_sys_sendmsg+0x23/0x30 [<00000000a4e97677>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff88811736a900 (size 64): comm "syz-executor255", pid 6961, jiffies 4294941312 (age 21.120s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10 a9 36 17 81 88 ff ff 10 a9 36 17 81 88 ff ff ..6.......6..... backtrace: [<000000000bce4d97>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005351be03>] netdev_name_node_alloc+0x2a/0x70 [<00000000e51ce12a>] register_netdevice+0xaf/0x650 [<000000001e7bad43>] bond_newlink+0x41/0x80 [<00000000651af2f0>] __rtnl_newlink+0x89a/0xb80 [<00000000360e9df5>] rtnl_newlink+0x4e/0x80 [<00000000e011064d>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007efb805f>] netlink_rcv_skb+0x61/0x170 [<00000000bbcbc561>] rtnetlink_rcv+0x1d/0x30 [<00000000cf032e1c>] netlink_unicast+0x223/0x310 [<000000008792feaf>] netlink_sendmsg+0x29f/0x550 [<00000000a2c65b59>] sock_sendmsg+0x54/0x70 [<000000005b5b243c>] ___sys_sendmsg+0x393/0x3c0 [<000000000b7158e8>] __sys_sendmsg+0x80/0xf0 [<00000000e52f982c>] __x64_sys_sendmsg+0x23/0x30 [<00000000a4e97677>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff888115549040 (size 64): comm "syz-executor255", pid 6968, jiffies 4294941312 (age 21.120s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 50 90 54 15 81 88 ff ff 50 90 54 15 81 88 ff ff P.T.....P.T..... backtrace: [<000000000bce4d97>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005351be03>] netdev_name_node_alloc+0x2a/0x70 [<00000000e51ce12a>] register_netdevice+0xaf/0x650 [<000000001e7bad43>] bond_newlink+0x41/0x80 [<00000000651af2f0>] __rtnl_newlink+0x89a/0xb80 [<00000000360e9df5>] rtnl_newlink+0x4e/0x80 [<00000000e011064d>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007efb805f>] netlink_rcv_skb+0x61/0x170 [<00000000bbcbc561>] rtnetlink_rcv+0x1d/0x30 [<00000000cf032e1c>] netlink_unicast+0x223/0x310 [<000000008792feaf>] netlink_sendmsg+0x29f/0x550 [<00000000a2c65b59>] sock_sendmsg+0x54/0x70 [<000000005b5b243c>] ___sys_sendmsg+0x393/0x3c0 [<000000000b7158e8>] __sys_sendmsg+0x80/0xf0 [<00000000e52f982c>] __x64_sys_sendmsg+0x23/0x30 [<00000000a4e97677>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff88811736a900 (size 64): comm "syz-executor255", pid 6961, jiffies 4294941312 (age 22.100s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10 a9 36 17 81 88 ff ff 10 a9 36 17 81 88 ff ff ..6.......6..... backtrace: [<000000000bce4d97>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005351be03>] netdev_name_node_alloc+0x2a/0x70 [<00000000e51ce12a>] register_netdevice+0xaf/0x650 [<000000001e7bad43>] bond_newlink+0x41/0x80 [<00000000651af2f0>] __rtnl_newlink+0x89a/0xb80 [<00000000360e9df5>] rtnl_newlink+0x4e/0x80 [<00000000e011064d>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007efb805f>] netlink_rcv_skb+0x61/0x170 [<00000000bbcbc561>] rtnetlink_rcv+0x1d/0x30 [<00000000cf032e1c>] netlink_unicast+0x223/0x310 [<000000008792feaf>] netlink_sendmsg+0x29f/0x550 [<00000000a2c65b59>] sock_sendmsg+0x54/0x70 [<000000005b5b243c>] ___sys_sendmsg+0x393/0x3c0 [<000000000b7158e8>] __sys_sendmsg+0x80/0xf0 [<00000000e52f982c>] __x64_sys_sendmsg+0x23/0x30 [<00000000a4e97677>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff888115549040 (size 64): comm "syz-executor255", pid 6968, jiffies 4294941312 (age 22.100s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 50 90 54 15 81 88 ff ff 50 90 54 15 81 88 ff ff P.T.....P.T..... backtrace: [<000000000bce4d97>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005351be03>] netdev_name_node_alloc+0x2a/0x70 [<00000000e51ce12a>] register_netdevice+0xaf/0x650 [<000000001e7bad43>] bond_newlink+0x41/0x80 [<00000000651af2f0>] __rtnl_newlink+0x89a/0xb80 [<00000000360e9df5>] rtnl_newlink+0x4e/0x80 [<00000000e011064d>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007efb805f>] netlink_rcv_skb+0x61/0x170 [<00000000bbcbc561>] rtnetlink_rcv+0x1d/0x30 [<00000000cf032e1c>] netlink_unicast+0x223/0x310 [<000000008792feaf>] netlink_sendmsg+0x29f/0x550 [<00000000a2c65b59>] sock_sendmsg+0x54/0x70 [<000000005b5b243c>] ___sys_sendmsg+0x393/0x3c0 [<000000000b7158e8>] __sys_sendmsg+0x80/0xf0 [<00000000e52f982c>] __x64_sys_sendmsg+0x23/0x30 [<00000000a4e97677>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff88811736a900 (size 64): comm "syz-executor255", pid 6961, jiffies 4294941312 (age 23.060s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10 a9 36 17 81 88 ff ff 10 a9 36 17 81 88 ff ff ..6.......6..... backtrace: [<000000000bce4d97>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005351be03>] netdev_name_node_alloc+0x2a/0x70 [<00000000e51ce12a>] register_netdevice+0xaf/0x650 [<000000001e7bad43>] bond_newlink+0x41/0x80 [<00000000651af2f0>] __rtnl_newlink+0x89a/0xb80 [<00000000360e9df5>] rtnl_newlink+0x4e/0x80 [<00000000e011064d>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007efb805f>] netlink_rcv_skb+0x61/0x170 [<00000000bbcbc561>] rtnetlink_rcv+0x1d/0x30 [<00000000cf032e1c>] netlink_unicast+0x223/0x310 [<000000008792feaf>] netlink_sendmsg+0x29f/0x550 [<00000000a2c65b59>] sock_sendmsg+0x54/0x70 [<000000005b5b243c>] ___sys_sendmsg+0x393/0x3c0 [<000000000b7158e8>] __sys_sendmsg+0x80/0xf0 [<00000000e52f982c>] __x64_sys_sendmsg+0x23/0x30 [<00000000a4e97677>] do_syscall_64+0x73/0x220 BUG: memory leak unreferenced object 0xffff888115549040 (size 64): comm "syz-executor255", pid 6968, jiffies 4294941312 (age 23.060s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 50 90 54 15 81 88 ff ff 50 90 54 15 81 88 ff ff P.T.....P.T..... backtrace: [<000000000bce4d97>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005351be03>] netdev_name_node_alloc+0x2a/0x70 [<00000000e51ce12a>] register_netdevice+0xaf/0x650 [<000000001e7bad43>] bond_newlink+0x41/0x80 [<00000000651af2f0>] __rtnl_newlink+0x89a/0xb80 [<00000000360e9df5>] rtnl_newlink+0x4e/0x80 [<00000000e011064d>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007efb805f>] netlink_rcv_skb+0x61/0x170 [<00000000bbcbc561>] rtnetlink_rcv+0x1d/0x30 [<00000000cf032e1c>] netlink_unicast+0x223/0x310 [<000000008792feaf>] netlink_sendmsg+0x29f/0x550 [<00000000a2c65b59>] sock_sendmsg+0x54/0x70 [<000000005b5b243c>] ___sys_sendmsg+0x393/0x3c0 [<000000000b7158e8>] __sys_sendmsg+0x80/0xf0 [<00000000e52f982c>] __x64_sys_sendmsg+0x23/0x30 [<00000000a4e97677>] do_syscall_64+0x73/0x220 executing program executing program executing program