[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 27.455746][ T25] audit: type=1800 audit(1562246541.626:33): pid=6974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 27.477288][ T25] audit: type=1800 audit(1562246541.626:34): pid=6974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 34.412129][ T25] audit: type=1400 audit(1562246548.576:35): avc: denied { map } for pid=7159 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.115' (ECDSA) to the list of known hosts. [ 40.538589][ T25] audit: type=1400 audit(1562246554.706:36): avc: denied { map } for pid=7173 comm="syz-executor166" path="/root/syz-executor166440091" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 47.332804][ T7174] IPVS: ftp: loaded support on port[0] = 21 [ 47.352050][ T7174] chnl_net:caif_netlink_parms(): no params data found [ 47.363622][ T7174] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.370783][ T7174] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.378355][ T7174] device bridge_slave_0 entered promiscuous mode [ 47.385002][ T7174] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.392137][ T7174] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.399344][ T7174] device bridge_slave_1 entered promiscuous mode [ 47.408129][ T7174] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 47.416729][ T7174] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 47.427261][ T7174] team0: Port device team_slave_0 added [ 47.433041][ T7174] team0: Port device team_slave_1 added [ 47.475981][ T7174] device hsr_slave_0 entered promiscuous mode [ 47.505230][ T7174] device hsr_slave_1 entered promiscuous mode [ 47.577500][ T7174] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.584702][ T7174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.591919][ T7174] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.598938][ T7174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.613334][ T7174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.621380][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.628975][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.636542][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.643786][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 47.652742][ T7174] 8021q: adding VLAN 0 to HW filter on device team0 [ 47.670492][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.678700][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.685937][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.697947][ T7174] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 47.708521][ T7174] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 47.719478][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.728091][ T7176] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.735119][ T7176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.742569][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.750659][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.758632][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.766522][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready executing program [ 47.774426][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 47.781650][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.791203][ T7174] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.885560][ T289] device bridge_slave_1 left promiscuous mode [ 48.891720][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.965464][ T289] device bridge_slave_0 left promiscuous mode [ 48.971593][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.166157][ T289] device hsr_slave_1 left promiscuous mode [ 49.205844][ T289] device hsr_slave_0 left promiscuous mode [ 49.255943][ T289] team0 (unregistering): Port device team_slave_1 removed [ 49.263748][ T289] team0 (unregistering): Port device team_slave_0 removed [ 49.271466][ T289] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 49.325955][ T289] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 49.378923][ T289] bond0 (unregistering): Released all slaves [ 53.712860][ T7173] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 55.667276][ T7173] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881189efd00 (size 64): comm "softirq", pid 0, jiffies 4294942009 (age 8.380s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 e0 8c b2 0c 81 88 ff ff ................ 00 00 00 00 00 00 00 00 e0 c3 15 83 ff ff ff ff ................ backtrace: [<00000000541da395>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000cc129461>] batadv_tvlv_handler_register+0xae/0x140 [<00000000599bbb18>] batadv_tt_init+0x78/0x180 [<000000009ff6c5ad>] batadv_mesh_init+0x196/0x230 [<0000000075c8bd95>] batadv_softif_init_late+0x1ca/0x220 [<000000008920bc86>] register_netdevice+0xbf/0x600 [<0000000017f54c6c>] __rtnl_newlink+0xaca/0xb30 [<000000005acb7eb1>] rtnl_newlink+0x4e/0x80 [<000000001416679a>] rtnetlink_rcv_msg+0x178/0x4b0 [<00000000fbd522f9>] netlink_rcv_skb+0x61/0x170 [<000000003f7e6932>] rtnetlink_rcv+0x1d/0x30 [<0000000078566715>] netlink_unicast+0x1ec/0x2d0 [<00000000cea4daad>] netlink_sendmsg+0x26a/0x480 [<00000000d8b67e5d>] sock_sendmsg+0x54/0x70 [<00000000744c0b23>] __sys_sendto+0x148/0x1f0 [<000000008f78d70d>] __x64_sys_sendto+0x2a/0x30 BUG: memory leak unreferenced object 0xffff88810c64e680 (size 128): comm "syz-executor166", pid 7174, jiffies 4294942017 (age 8.300s) hex dump (first 32 bytes): f0 e8 30 21 81 88 ff ff f0 e8 30 21 81 88 ff ff ..0!......0!.... 82 21 ff 89 b8 3b 9e fd 75 86 f4 0a 00 00 00 00 .!...;..u....... backtrace: [<00000000541da395>] kmem_cache_alloc_trace+0x13d/0x280 [<000000007855539b>] hsr_create_self_node+0x42/0x150 [<000000009805d9ca>] hsr_dev_finalize+0xa4/0x233 [<00000000047c34d3>] hsr_newlink+0xf3/0x140 [<000000009c16f560>] __rtnl_newlink+0x892/0xb30 [<000000005acb7eb1>] rtnl_newlink+0x4e/0x80 [<000000001416679a>] rtnetlink_rcv_msg+0x178/0x4b0 [<00000000fbd522f9>] netlink_rcv_skb+0x61/0x170 [<000000003f7e6932>] rtnetlink_rcv+0x1d/0x30 [<0000000078566715>] netlink_unicast+0x1ec/0x2d0 [<00000000cea4daad>] netlink_sendmsg+0x26a/0x480 [<00000000d8b67e5d>] sock_sendmsg+0x54/0x70 [<00000000744c0b23>] __sys_sendto+0x148/0x1f0 [<000000008f78d70d>] __x64_sys_sendto+0x2a/0x30 [<0000000070b68968>] do_syscall_64+0x76/0x1a0 [<000000007dc9a246>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810e22d8c0 (size 64): comm "syz-executor166", pid 7174, jiffies 4294942017 (age 8.300s) hex dump (first 32 bytes): 80 12 1b 12 81 88 ff ff 00 02 00 00 00 00 ad de ................ 00 e0 30 21 81 88 ff ff c0 e8 30 21 81 88 ff ff ..0!......0!.... backtrace: [<00000000541da395>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000ca3f371b>] hsr_add_port+0xe7/0x220 [<00000000ef09ab66>] hsr_dev_finalize+0x14f/0x233 [<00000000047c34d3>] hsr_newlink+0xf3/0x140 [<000000009c16f560>] __rtnl_newlink+0x892/0xb30 [<000000005acb7eb1>] rtnl_newlink+0x4e/0x80 [<000000001416679a>] rtnetlink_rcv_msg+0x178/0x4b0 [<00000000fbd522f9>] netlink_rcv_skb+0x61/0x170 [<000000003f7e6932>] rtnetlink_rcv+0x1d/0x30 [<0000000078566715>] netlink_unicast+0x1ec/0x2d0 [<00000000cea4daad>] netlink_sendmsg+0x26a/0x480 [<00000000d8b67e5d>] sock_sendmsg+0x54/0x70 [<00000000744c0b23>] __sys_sendto+0x148/0x1f0 [<000000008f78d70d>] __x64_sys_sendto+0x2a/0x30 [<0000000070b68968>] do_syscall_64+0x76/0x1a0 [<000000007dc9a246>] entry_SYSCALL_64_after_hwframe+0x44/0xa9