[....] Starting file context maintaining daemon: restorecond[ 26.169835][ T26] kauditd_printk_skb: 16 callbacks suppressed [ 26.169841][ T26] audit: type=1400 audit(1576160090.025:37): avc: denied { watch } for pid=6947 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16180 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [?25l[?1c7[1[ 26.201043][ T26] audit: type=1400 audit(1576160090.025:38): avc: denied { watch } for pid=6947 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 G[ ok 8[?25h[?0c[ 26.229032][ T26] audit: type=1800 audit(1576160090.085:39): pid=6845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 . [ 26.251013][ T26] audit: type=1800 audit(1576160090.085:40): pid=6845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 30.931920][ T26] audit: type=1400 audit(1576160094.785:41): avc: denied { map } for pid=7016 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.182' (ECDSA) to the list of known hosts. [ 36.914600][ T26] audit: type=1400 audit(1576160100.765:42): avc: denied { map } for pid=7030 comm="syz-executor420" path="/root/syz-executor420141233" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 43.679089][ T7032] IPVS: ftp: loaded support on port[0] = 21 [ 43.690655][ T26] audit: type=1400 audit(1576160107.545:43): avc: denied { create } for pid=7032 comm="syz-executor420" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 43.695813][ T7032] netlink: 'syz-executor420': attribute type 39 has an invalid length. [ 43.715383][ T26] audit: type=1400 audit(1576160107.545:44): avc: denied { write } for pid=7032 comm="syz-executor420" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 43.723767][ T7032] FAULT_INJECTION: forcing a failure. [ 43.723767][ T7032] name failslab, interval 1, probability 0, space 0, times 1 [ 43.748379][ T26] audit: type=1400 audit(1576160107.545:45): avc: denied { read } for pid=7032 comm="syz-executor420" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 43.761020][ T7032] CPU: 0 PID: 7032 Comm: syz-executor420 Not tainted 5.5.0-rc1-syzkaller #0 [ 43.794260][ T7032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 43.804288][ T7032] Call Trace: [ 43.807548][ T7032] dump_stack+0xbc/0xe6 [ 43.811724][ T7032] should_fail.cold+0x3c/0x49 [ 43.816413][ T7032] __should_failslab+0x65/0xa0 [ 43.821145][ T7032] should_failslab+0x9/0x14 [ 43.825613][ T7032] __kmalloc_track_caller+0x50/0x300 [ 43.830878][ T7032] ? kstrdup_const+0x48/0x60 [ 43.835465][ T7032] kstrdup+0x3a/0x70 [ 43.839430][ T7032] kstrdup_const+0x48/0x60 [ 43.843826][ T7032] __kernfs_new_node+0x53/0x280 [ 43.848655][ T7032] ? make_kgid+0x23/0x30 [ 43.852876][ T7032] kernfs_new_node+0x5e/0x90 [ 43.857444][ T7032] kernfs_create_dir_ns+0x52/0xb0 [ 43.862563][ T7032] sysfs_create_dir_ns+0x8a/0x120 [ 43.867565][ T7032] kobject_add_internal+0x103/0x350 [ 43.872761][ T7032] kobject_add+0x9e/0xe0 [ 43.877004][ T7032] ? _raw_spin_unlock+0x1f/0x40 [ 43.881833][ T7032] ? get_device_parent.isra.0+0x108/0x240 [ 43.887563][ T7032] device_add+0x19d/0xa60 [ 43.891862][ T7032] netdev_register_kobject+0xa6/0x1b0 [ 43.897224][ T7032] register_netdevice+0x1ce/0x650 [ 43.902218][ T7032] ? br_netpoll_disable+0x40/0x40 [ 43.907225][ T7032] br_dev_newlink+0x26/0xb0 [ 43.911711][ T7032] ? br_afspec+0x2f0/0x2f0 [ 43.916161][ T7032] __rtnl_newlink+0x89a/0xb80 [ 43.920839][ T7032] ? is_bpf_text_address+0x24/0x30 [ 43.925923][ T7032] ? kernel_text_address+0x45/0xb0 [ 43.931004][ T7032] ? full_name_hash+0x98/0xe0 [ 43.935667][ T7032] ? tomoyo_merge_path_acl+0x39/0x60 [ 43.941311][ T7032] ? tomoyo_same_path_acl+0x60/0x60 [ 43.946477][ T7032] ? tomoyo_update_domain+0x9f/0x1f0 [ 43.951958][ T7032] ? debug_smp_processor_id+0x27/0xad [ 43.957309][ T7032] ? rcu_is_watching+0x11/0x50 [ 43.962166][ T7032] ? bpf_prog_kallsyms_find+0xee/0x120 [ 43.967604][ T7032] ? __rtnl_newlink+0xb80/0xb80 [ 43.972425][ T7032] rtnl_newlink+0x4e/0x80 [ 43.976767][ T7032] rtnetlink_rcv_msg+0x178/0x4b0 [ 43.981693][ T7032] ? rtnl_calcit.isra.0+0x170/0x170 [ 43.986914][ T7032] netlink_rcv_skb+0x61/0x170 [ 43.991562][ T7032] rtnetlink_rcv+0x1d/0x30 [ 43.995978][ T7032] netlink_unicast+0x223/0x310 [ 44.000710][ T7032] netlink_sendmsg+0x2c0/0x570 [ 44.005459][ T7032] sock_sendmsg+0x54/0x70 [ 44.009769][ T7032] ____sys_sendmsg+0x2d0/0x300 [ 44.014524][ T7032] ___sys_sendmsg+0x8a/0xd0 [ 44.018999][ T7032] ? kstrtouint+0x76/0xa0 [ 44.023432][ T7032] ? kstrtouint_from_user+0x7f/0xb0 [ 44.028637][ T7032] ? __fget_light+0x70/0xb0 [ 44.033118][ T7032] ? __fdget+0x1b/0x20 [ 44.037166][ T7032] ? sockfd_lookup_light+0x6c/0xb0 [ 44.042255][ T7032] __sys_sendmsg+0x80/0xf0 [ 44.046643][ T7032] __x64_sys_sendmsg+0x23/0x30 [ 44.051375][ T7032] do_syscall_64+0x73/0x220 [ 44.055849][ T7032] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 44.061717][ T7032] RIP: 0033:0x4426e9 [ 44.065584][ T7032] Code: 45 02 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0d fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 44.085445][ T7032] RSP: 002b:00007ffd54361d78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 44.093861][ T7032] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004426e9 [ 44.101809][ T7032] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 44.109760][ T7032] RBP: 00007ffd54361df0 R08: 0000000000000002 R09: 006e75745f003833 [ 44.117702][ T7032] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 44.125653][ T7032] R13: 0000000000000004 R14: 0000000000000004 R15: 00007ffd54361ee0 [ 44.133740][ T7032] kobject_add_internal failed for bridge0 (error: -12 parent: net) [ 44.897421][ T20] tipc: TX() has been purged, node left! [ 50.002522][ T7030] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881090de4e0 (size 32): comm "syz-executor420", pid 7032, jiffies 4294941647 (age 8.260s) hex dump (first 32 bytes): 62 72 69 64 67 65 30 00 6b 2f 37 30 33 32 00 00 bridge0.k/7032.. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000724ce3c8>] __kmalloc_track_caller+0x165/0x300 [<00000000949fcc46>] kstrdup+0x3a/0x70 [<000000003af95846>] kstrdup_const+0x48/0x60 [<00000000eb0ebe7c>] kvasprintf_const+0x7e/0xe0 [<000000008f403298>] kobject_set_name_vargs+0x40/0xe0 [<00000000d18e6773>] dev_set_name+0x63/0x90 [<00000000a5617826>] netdev_register_kobject+0x5a/0x1b0 [<0000000058ead5cf>] register_netdevice+0x1ce/0x650 [<0000000086b5d9eb>] br_dev_newlink+0x26/0xb0 [<00000000d7af1204>] __rtnl_newlink+0x89a/0xb80 [<000000003e007aab>] rtnl_newlink+0x4e/0x80 [<0000000083fc8d82>] rtnetlink_rcv_msg+0x178/0x4b0 [<00000000ed89debb>] netlink_rcv_skb+0x61/0x170 [<00000000c493abcc>] rtnetlink_rcv+0x1d/0x30 [<00000000de78fd36>] netlink_unicast+0x223/0x310 [<0000000017f965b1>] netlink_sendmsg+0x2c0/0x570