[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.789552][ T25] kauditd_printk_skb: 20 callbacks suppressed [ 26.789558][ T25] audit: type=1400 audit(1571373976.106:41): avc: denied { map } for pid=6831 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.31' (ECDSA) to the list of known hosts. [ 59.594018][ T25] audit: type=1400 audit(1571374008.916:42): avc: denied { map } for pid=6847 comm="syz-executor889" path="/root/syz-executor889321764" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 66.402953][ T6848] IPVS: ftp: loaded support on port[0] = 21 [ 66.423257][ T6848] chnl_net:caif_netlink_parms(): no params data found [ 66.434907][ T6848] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.442020][ T6848] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.449286][ T6848] device bridge_slave_0 entered promiscuous mode [ 66.456001][ T6848] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.463506][ T6848] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.470743][ T6848] device bridge_slave_1 entered promiscuous mode [ 66.479577][ T6848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.489019][ T6848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.500302][ T6848] team0: Port device team_slave_0 added [ 66.506153][ T6848] team0: Port device team_slave_1 added [ 66.551593][ T6848] device hsr_slave_0 entered promiscuous mode [ 66.591092][ T6848] device hsr_slave_1 entered promiscuous mode [ 66.662944][ T6848] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.669975][ T6848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.677467][ T6848] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.684473][ T6848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.697741][ T6848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.705562][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.713373][ T3041] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.720596][ T3041] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.728692][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 66.736948][ T6848] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.744613][ T3527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.753370][ T3527] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.760386][ T3527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.771423][ T6850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.779538][ T6850] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.786568][ T6850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.794271][ T6850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.802336][ T6850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready executing program [ 66.810515][ T6850] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.818551][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.827543][ T6848] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.838505][ T6848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.845911][ T6850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.855952][ T6848] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program [ 73.672109][ T6848] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811944c300 (size 768): comm "syz-executor889", pid 6857, jiffies 4294943961 (age 13.810s) hex dump (first 32 bytes): 03 00 00 00 01 00 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000069d39bfd>] kmem_cache_alloc+0x13f/0x2c0 [<0000000025e438c9>] sock_alloc_inode+0x1c/0xa0 [<000000008ef493ae>] alloc_inode+0x2c/0xe0 [<0000000051ef95fa>] new_inode_pseudo+0x18/0x70 [<00000000cf4d4b3b>] sock_alloc+0x1c/0x90 [<00000000e331e051>] __sock_create+0x8f/0x250 [<00000000f2b847b4>] sock_create_kern+0x3b/0x50 [<000000009234f529>] smc_create+0xae/0x160 [<000000009d1829f8>] __sock_create+0x164/0x250 [<000000007fde4fe2>] __sys_socket+0x69/0x110 [<000000006189411d>] __x64_sys_socket+0x1e/0x30 [<00000000f175c212>] do_syscall_64+0x73/0x1f0 [<00000000bcd85971>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811b6a9f50 (size 56): comm "syz-executor889", pid 6857, jiffies 4294943961 (age 13.810s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 80 c3 44 19 81 88 ff ff 68 9f 6a 1b 81 88 ff ff ..D.....h.j..... backtrace: [<0000000069d39bfd>] kmem_cache_alloc+0x13f/0x2c0 [<000000000bfef4fc>] security_inode_alloc+0x33/0xb0 [<00000000a6ac5df6>] inode_init_always+0x108/0x200 [<00000000097b824f>] alloc_inode+0x49/0xe0 [<0000000051ef95fa>] new_inode_pseudo+0x18/0x70 [<00000000cf4d4b3b>] sock_alloc+0x1c/0x90 [<00000000e331e051>] __sock_create+0x8f/0x250 [<00000000f2b847b4>] sock_create_kern+0x3b/0x50 [<000000009234f529>] smc_create+0xae/0x160 [<000000009d1829f8>] __sock_create+0x164/0x250 [<000000007fde4fe2>] __sys_socket+0x69/0x110 [<000000006189411d>] __x64_sys_socket+0x1e/0x30 [<00000000f175c212>] do_syscall_64+0x73/0x1f0 [<00000000bcd85971>] entry_SYSCALL_64_after_hwframe+0x44/0xa9