[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [ 27.249688][ T26] audit: type=1400 audit(1575660220.786:37): avc: denied { watch } for pid=7025 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 31.949865][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 31.949872][ T26] audit: type=1400 audit(1575660225.486:41): avc: denied { map } for pid=7107 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.3' (ECDSA) to the list of known hosts. 2019/12/06 19:25:01 parsed 1 programs [ 107.567161][ T26] audit: type=1400 audit(1575660301.096:42): avc: denied { map } for pid=7122 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 109.054437][ T26] audit: type=1400 audit(1575660302.586:43): avc: denied { map } for pid=7122 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16698 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 109.081184][ T3798] kmemleak: Automatic memory scanning thread ended 2019/12/06 19:25:09 executed programs: 0 [ 116.353416][ T7137] IPVS: ftp: loaded support on port[0] = 21 [ 116.372682][ T7137] chnl_net:caif_netlink_parms(): no params data found [ 116.384233][ T7137] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.391452][ T7137] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.398822][ T7137] device bridge_slave_0 entered promiscuous mode [ 116.405917][ T7137] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.413534][ T7137] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.420989][ T7137] device bridge_slave_1 entered promiscuous mode [ 116.430031][ T7137] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 116.440174][ T7137] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 116.451645][ T7137] team0: Port device team_slave_0 added [ 116.457569][ T7137] team0: Port device team_slave_1 added [ 116.499861][ T7137] device hsr_slave_0 entered promiscuous mode [ 116.539216][ T7137] device hsr_slave_1 entered promiscuous mode [ 116.624630][ T26] audit: type=1400 audit(1575660310.156:44): avc: denied { create } for pid=7137 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 116.624663][ T7137] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 116.651586][ T26] audit: type=1400 audit(1575660310.156:45): avc: denied { write } for pid=7137 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 116.681351][ T26] audit: type=1400 audit(1575660310.156:46): avc: denied { read } for pid=7137 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 116.709818][ T7137] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 116.749862][ T7137] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 116.799800][ T7137] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 116.851334][ T7137] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.858421][ T7137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.865693][ T7137] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.872715][ T7137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.886269][ T7137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 116.894513][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.905340][ T3549] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.923048][ T3549] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.930474][ T3549] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 116.939347][ T7137] 8021q: adding VLAN 0 to HW filter on device team0 [ 116.957502][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.965877][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.972946][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.984231][ T7137] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 116.994845][ T7137] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 117.006117][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.014641][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.021686][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.029663][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 117.038062][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 117.046247][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 117.054645][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 117.062701][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 117.070025][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 117.080415][ T7137] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 117.088501][ T26] audit: type=1400 audit(1575660310.616:47): avc: denied { associate } for pid=7137 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 117.089148][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 117.122034][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 2019/12/06 19:25:16 executed programs: 1 [ 123.529228][ T7161] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888121b64380 (size 64): comm "syz-executor.0", pid 7143, jiffies 4294948985 (age 12.680s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 43 b6 21 81 88 ff ff 90 43 b6 21 81 88 ff ff .C.!.....C.!.... backtrace: [<00000000681c6a2e>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005893c8f4>] netdev_name_node_alloc+0x2a/0x70 [<00000000778b3824>] register_netdevice+0xaf/0x650 [<00000000c3941f88>] bond_newlink+0x41/0x80 [<0000000080f64593>] __rtnl_newlink+0x89a/0xb80 [<000000008b244457>] rtnl_newlink+0x4e/0x80 [<00000000139edd64>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000007ce73173>] netlink_rcv_skb+0x61/0x170 [<0000000031bf85fa>] rtnetlink_rcv+0x1d/0x30 [<00000000859af701>] netlink_unicast+0x223/0x310 [<00000000c1480329>] netlink_sendmsg+0x2c0/0x570 [<00000000f2415eb5>] sock_sendmsg+0x54/0x70 [<000000005f9e2bd2>] ____sys_sendmsg+0x2d0/0x300 [<000000009a77d4fd>] ___sys_sendmsg+0x9c/0x100 [<000000008ce8fc13>] __sys_sendmsg+0x80/0xf0 [<0000000026ffd969>] __x64_sys_sendmsg+0x23/0x30