[ 27.291837][ T25] audit: type=1804 audit(1570584400.297:49): pid=6969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 27.312722][ T25] audit: type=1804 audit(1570584400.337:50): pid=6967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.125' (ECDSA) to the list of known hosts. syzkaller login: [ 37.082428][ T25] kauditd_printk_skb: 13 callbacks suppressed [ 37.082437][ T25] audit: type=1400 audit(1570584410.107:64): avc: denied { map } for pid=6991 comm="syz-executor566" path="/root/syz-executor566088200" dev="sda1" ino=16243 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 54.487419][ T6991] kmemleak: 466 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881211d9a00 (size 224): comm "syz-executor566", pid 6993, jiffies 4294941654 (age 12.660s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 20 87 24 81 88 ff ff 00 98 4f 19 81 88 ff ff . .$......O..... backtrace: [<0000000077d2c3f9>] kmem_cache_alloc_node+0x163/0x2f0 [<000000005fd9f97c>] __alloc_skb+0x6e/0x210 [<0000000098ec5e32>] alloc_skb_with_frags+0x5f/0x250 [<000000009a107754>] sock_alloc_send_pskb+0x269/0x2a0 [<0000000044d04fa9>] sock_alloc_send_skb+0x32/0x40 [<000000002ab6ba4c>] llc_ui_sendmsg+0x10a/0x540 [<00000000a2e1105e>] sock_sendmsg+0x54/0x70 [<000000008181684a>] ___sys_sendmsg+0x194/0x3c0 [<00000000788bdf38>] __sys_sendmmsg+0xf4/0x270 [<00000000283d4e80>] __x64_sys_sendmmsg+0x28/0x30 [<00000000040a22f4>] do_syscall_64+0x73/0x1f0 [<00000000e91ecc76>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888111892b00 (size 224): comm "syz-executor566", pid 6993, jiffies 4294941654 (age 12.660s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 20 87 24 81 88 ff ff 00 98 4f 19 81 88 ff ff . .$......O..... backtrace: [<0000000077d2c3f9>] kmem_cache_alloc_node+0x163/0x2f0 [<000000005fd9f97c>] __alloc_skb+0x6e/0x210 [<0000000098ec5e32>] alloc_skb_with_frags+0x5f/0x250 [<000000009a107754>] sock_alloc_send_pskb+0x269/0x2a0 [<0000000044d04fa9>] sock_alloc_send_skb+0x32/0x40 [<000000002ab6ba4c>] llc_ui_sendmsg+0x10a/0x540 [<00000000a2e1105e>] sock_sendmsg+0x54/0x70 [<000000008181684a>] ___sys_sendmsg+0x194/0x3c0 [<00000000788bdf38>] __sys_sendmmsg+0xf4/0x270 [<00000000283d4e80>] __x64_sys_sendmmsg+0x28/0x30 [<00000000040a22f4>] do_syscall_64+0x73/0x1f0 [<00000000e91ecc76>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e413e00 (size 224): comm "syz-executor566", pid 6993, jiffies 4294941654 (age 12.660s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 20 87 24 81 88 ff ff 00 98 4f 19 81 88 ff ff . .$......O..... backtrace: [<0000000077d2c3f9>] kmem_cache_alloc_node+0x163/0x2f0 [<000000005fd9f97c>] __alloc_skb+0x6e/0x210 [<0000000098ec5e32>] alloc_skb_with_frags+0x5f/0x250 [<000000009a107754>] sock_alloc_send_pskb+0x269/0x2a0 [<0000000044d04fa9>] sock_alloc_send_skb+0x32/0x40 [<000000002ab6ba4c>] llc_ui_sendmsg+0x10a/0x540 [<00000000a2e1105e>] sock_sendmsg+0x54/0x70 [<000000008181684a>] ___sys_sendmsg+0x194/0x3c0 [<00000000788bdf38>] __sys_sendmmsg+0xf4/0x270 [<00000000283d4e80>] __x64_sys_sendmmsg+0x28/0x30 [<00000000040a22f4>] do_syscall_64+0x73/0x1f0 [<00000000e91ecc76>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881211d9e00 (size 224): comm "syz-executor566", pid 6993, jiffies 4294941654 (age 12.660s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 20 87 24 81 88 ff ff 00 98 4f 19 81 88 ff ff . .$......O..... backtrace: [<0000000077d2c3f9>] kmem_cache_alloc_node+0x163/0x2f0 [<000000005fd9f97c>] __alloc_skb+0x6e/0x210 [<0000000098ec5e32>] alloc_skb_with_frags+0x5f/0x250 [<000000009a107754>] sock_alloc_send_pskb+0x269/0x2a0 [<0000000044d04fa9>] sock_alloc_send_skb+0x32/0x40 [<000000002ab6ba4c>] llc_ui_sendmsg+0x10a/0x540 [<00000000a2e1105e>] sock_sendmsg+0x54/0x70 [<000000008181684a>] ___sys_sendmsg+0x194/0x3c0 [<00000000788bdf38>] __sys_sendmmsg+0xf4/0x270 [<00000000283d4e80>] __x64_sys_sendmmsg+0x28/0x30 [<00000000040a22f4>] do_syscall_64+0x73/0x1f0 [<00000000e91ecc76>] entry_SYSCALL_64_after_hwframe+0x44/0xa9