[ 23.729399][ T25] audit: type=1800 audit(1569718878.010:45): pid=6642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 23.751923][ T25] audit: type=1804 audit(1569718878.050:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 23.773537][ T25] audit: type=1804 audit(1569718878.080:47): pid=6806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 23.794952][ T25] audit: type=1804 audit(1569718878.080:48): pid=6808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 23.815553][ T25] audit: type=1804 audit(1569718878.100:49): pid=6804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 23.815561][ T25] audit: type=1804 audit(1569718878.100:50): pid=6808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.192' (ECDSA) to the list of known hosts. syzkaller login: [ 104.044546][ T25] kauditd_printk_skb: 11 callbacks suppressed [ 104.044553][ T25] audit: type=1400 audit(1569718958.350:62): avc: denied { map } for pid=6828 comm="syz-executor784" path="/root/syz-executor784938733" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program [ 117.033716][ T6836] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888114e0d380 (size 64): comm "syz-executor784", pid 6832, jiffies 4294948358 (age 17.460s) hex dump (first 32 bytes): 23 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 #N.............. d8 e0 2c 17 82 88 ff ff 00 00 00 00 00 00 00 00 ..,............. backtrace: [<000000003583489a>] kmem_cache_alloc+0x13f/0x2c0 [<00000000d7a786d6>] sctp_get_port_local+0x189/0x5a0 [<0000000037c605fd>] sctp_do_bind+0xcc/0x200 [<000000008f61f097>] sctp_bindx_add+0x4b/0xd0 [<00000000229ad721>] sctp_setsockopt_bindx+0x156/0x1b0 [<00000000477a73f6>] sctp_setsockopt+0xaea/0x2dc0 [<00000000aeb0e4fc>] sock_common_setsockopt+0x38/0x50 [<00000000ec9bdfbd>] __sys_setsockopt+0x10f/0x220 [<00000000a917a321>] __x64_sys_setsockopt+0x26/0x30 [<00000000a924464c>] do_syscall_64+0x73/0x1f0 [<0000000032624cb1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888114e0d380 (size 64): comm "syz-executor784", pid 6832, jiffies 4294948358 (age 19.250s) hex dump (first 32 bytes): 23 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 #N.............. d8 e0 2c 17 82 88 ff ff 00 00 00 00 00 00 00 00 ..,............. backtrace: [<000000003583489a>] kmem_cache_alloc+0x13f/0x2c0 [<00000000d7a786d6>] sctp_get_port_local+0x189/0x5a0 [<0000000037c605fd>] sctp_do_bind+0xcc/0x200 [<000000008f61f097>] sctp_bindx_add+0x4b/0xd0 [<00000000229ad721>] sctp_setsockopt_bindx+0x156/0x1b0 [<00000000477a73f6>] sctp_setsockopt+0xaea/0x2dc0 [<00000000aeb0e4fc>] sock_common_setsockopt+0x38/0x50 [<00000000ec9bdfbd>] __sys_setsockopt+0x10f/0x220 [<00000000a917a321>] __x64_sys_setsockopt+0x26/0x30 [<00000000a924464c>] do_syscall_64+0x73/0x1f0 [<0000000032624cb1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888114e0d380 (size 64): comm "syz-executor784", pid 6832, jiffies 4294948358 (age 19.300s) hex dump (first 32 bytes): 23 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 #N.............. d8 e0 2c 17 82 88 ff ff 00 00 00 00 00 00 00 00 ..,............. backtrace: [<000000003583489a>] kmem_cache_alloc+0x13f/0x2c0 [<00000000d7a786d6>] sctp_get_port_local+0x189/0x5a0 [<0000000037c605fd>] sctp_do_bind+0xcc/0x200 [<000000008f61f097>] sctp_bindx_add+0x4b/0xd0 [<00000000229ad721>] sctp_setsockopt_bindx+0x156/0x1b0 [<00000000477a73f6>] sctp_setsockopt+0xaea/0x2dc0 [<00000000aeb0e4fc>] sock_common_setsockopt+0x38/0x50 [<00000000ec9bdfbd>] __sys_setsockopt+0x10f/0x220 [<00000000a917a321>] __x64_sys_setsockopt+0x26/0x30 [<00000000a924464c>] do_syscall_64+0x73/0x1f0 [<0000000032624cb1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888114e0d380 (size 64): comm "syz-executor784", pid 6832, jiffies 4294948358 (age 20.230s) hex dump (first 32 bytes): 23 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 #N.............. d8 e0 2c 17 82 88 ff ff 00 00 00 00 00 00 00 00 ..,............. backtrace: [<000000003583489a>] kmem_cache_alloc+0x13f/0x2c0 [<00000000d7a786d6>] sctp_get_port_local+0x189/0x5a0 [<0000000037c605fd>] sctp_do_bind+0xcc/0x200 [<000000008f61f097>] sctp_bindx_add+0x4b/0xd0 [<00000000229ad721>] sctp_setsockopt_bindx+0x156/0x1b0 [<00000000477a73f6>] sctp_setsockopt+0xaea/0x2dc0 [<00000000aeb0e4fc>] sock_common_setsockopt+0x38/0x50 [<00000000ec9bdfbd>] __sys_setsockopt+0x10f/0x220 [<00000000a917a321>] __x64_sys_setsockopt+0x26/0x30 [<00000000a924464c>] do_syscall_64+0x73/0x1f0 [<0000000032624cb1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888114e0d380 (size 64): comm "syz-executor784", pid 6832, jiffies 4294948358 (age 21.150s) hex dump (first 32 bytes): 23 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 #N.............. d8 e0 2c 17 82 88 ff ff 00 00 00 00 00 00 00 00 ..,............. backtrace: [<000000003583489a>] kmem_cache_alloc+0x13f/0x2c0 [<00000000d7a786d6>] sctp_get_port_local+0x189/0x5a0 [<0000000037c605fd>] sctp_do_bind+0xcc/0x200 [<000000008f61f097>] sctp_bindx_add+0x4b/0xd0 [<00000000229ad721>] sctp_setsockopt_bindx+0x156/0x1b0 [<00000000477a73f6>] sctp_setsockopt+0xaea/0x2dc0 [<00000000aeb0e4fc>] sock_common_setsockopt+0x38/0x50 [<00000000ec9bdfbd>] __sys_setsockopt+0x10f/0x220 [<00000000a917a321>] __x64_sys_setsockopt+0x26/0x30 [<00000000a924464c>] do_syscall_64+0x73/0x1f0 [<0000000032624cb1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888114e0d380 (size 64): comm "syz-executor784", pid 6832, jiffies 4294948358 (age 22.070s) hex dump (first 32 bytes): 23 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 #N.............. d8 e0 2c 17 82 88 ff ff 00 00 00 00 00 00 00 00 ..,............. backtrace: [<000000003583489a>] kmem_cache_alloc+0x13f/0x2c0 [<00000000d7a786d6>] sctp_get_port_local+0x189/0x5a0 [<0000000037c605fd>] sctp_do_bind+0xcc/0x200 [<000000008f61f097>] sctp_bindx_add+0x4b/0xd0 [<00000000229ad721>] sctp_setsockopt_bindx+0x156/0x1b0 [<00000000477a73f6>] sctp_setsockopt+0xaea/0x2dc0 [<00000000aeb0e4fc>] sock_common_setsockopt+0x38/0x50 [<00000000ec9bdfbd>] __sys_setsockopt+0x10f/0x220 [<00000000a917a321>] __x64_sys_setsockopt+0x26/0x30 [<00000000a924464c>] do_syscall_64+0x73/0x1f0 [<0000000032624cb1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888114e0d380 (size 64): comm "syz-executor784", pid 6832, jiffies 4294948358 (age 22.120s) hex dump (first 32 bytes): 23 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 #N.............. d8 e0 2c 17 82 88 ff ff 00 00 00 00 00 00 00 00 ..,............. backtrace: [<000000003583489a>] kmem_cache_alloc+0x13f/0x2c0 [<00000000d7a786d6>] sctp_get_port_local+0x189/0x5a0 [<0000000037c605fd>] sctp_do_bind+0xcc/0x200 [<000000008f61f097>] sctp_bindx_add+0x4b/0xd0 [<00000000229ad721>] sctp_setsockopt_bindx+0x156/0x1b0 [<00000000477a73f6>] sctp_setsockopt+0xaea/0x2dc0 [<00000000aeb0e4fc>] sock_common_setsockopt+0x38/0x50 [<00000000ec9bdfbd>] __sys_setsockopt+0x10f/0x220 [<00000000a917a321>] __x64_sys_setsockopt+0x26/0x30 [<00000000a924464c>] do_syscall_64+0x73/0x1f0 [<0000000032624cb1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program