[ 24.400402][ T24] audit: type=1804 audit(1569783540.929:55): pid=6802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 24.400411][ T24] audit: type=1804 audit(1569783540.929:56): pid=6803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 24.400419][ T24] audit: type=1804 audit(1569783540.929:57): pid=6798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 24.400426][ T24] audit: type=1804 audit(1569783540.939:58): pid=6804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 24.400435][ T24] audit: type=1804 audit(1569783540.939:59): pid=6799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 24.400442][ T24] audit: type=1804 audit(1569783540.939:60): pid=6799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.419088][ T24] audit: type=1400 audit(1569783545.979:61): avc: denied { map } for pid=6815 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.126' (ECDSA) to the list of known hosts. [ 35.235068][ T24] audit: type=1400 audit(1569783551.799:62): avc: denied { map } for pid=6828 comm="syz-executor282" path="/root/syz-executor282872250" dev="sda1" ino=16503 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program [ 68.941518][ T6828] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 71.840139][ T6828] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888120e35400 (size 224): comm "syz-executor282", pid 6831, jiffies 4294941476 (age 29.860s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 70 8f 2a 81 88 ff ff 00 00 00 00 00 00 00 00 .p.*............ backtrace: [<000000005569132f>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000bd33592d>] __alloc_skb+0x6e/0x210 [<000000009a671b50>] llc_alloc_frame+0x66/0x110 [<00000000012dbf1d>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<0000000037b20905>] llc_conn_state_process+0x1ac/0x640 [<0000000045f5a9ce>] llc_establish_connection+0x110/0x170 [<00000000cff02803>] llc_ui_connect+0x10e/0x370 [<000000004e25549d>] __sys_connect+0x11d/0x170 [<0000000065778004>] __x64_sys_connect+0x1e/0x30 [<00000000c326671f>] do_syscall_64+0x73/0x1f0 [<0000000088dc60ef>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888121dece00 (size 224): comm "syz-executor282", pid 6833, jiffies 4294943277 (age 11.850s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 70 8f 2a 81 88 ff ff 00 00 00 00 00 00 00 00 .p.*............ backtrace: [<000000005569132f>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000bd33592d>] __alloc_skb+0x6e/0x210 [<000000009a671b50>] llc_alloc_frame+0x66/0x110 [<00000000012dbf1d>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<0000000037b20905>] llc_conn_state_process+0x1ac/0x640 [<0000000045f5a9ce>] llc_establish_connection+0x110/0x170 [<00000000cff02803>] llc_ui_connect+0x10e/0x370 [<000000004e25549d>] __sys_connect+0x11d/0x170 [<0000000065778004>] __x64_sys_connect+0x1e/0x30 [<00000000c326671f>] do_syscall_64+0x73/0x1f0 [<0000000088dc60ef>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881184f0400 (size 512): comm "syz-executor282", pid 6833, jiffies 4294943277 (age 11.850s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 03 00 c4 ................ 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000087c4339c>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<0000000009069178>] __kmalloc_node_track_caller+0x38/0x50 [<000000002f602699>] __kmalloc_reserve.isra.0+0x40/0xb0 [<000000004bc84843>] __alloc_skb+0xa0/0x210 [<000000009a671b50>] llc_alloc_frame+0x66/0x110 [<00000000012dbf1d>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<0000000037b20905>] llc_conn_state_process+0x1ac/0x640 [<0000000045f5a9ce>] llc_establish_connection+0x110/0x170 [<00000000cff02803>] llc_ui_connect+0x10e/0x370 [<000000004e25549d>] __sys_connect+0x11d/0x170 [<0000000065778004>] __x64_sys_connect+0x1e/0x30 [<00000000c326671f>] do_syscall_64+0x73/0x1f0 [<0000000088dc60ef>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888121dec900 (size 224): comm "softirq", pid 0, jiffies 4294943384 (age 10.780s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 70 8f 2a 81 88 ff ff 00 00 00 00 00 00 00 00 .p.*............ backtrace: [<000000005569132f>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000bd33592d>] __alloc_skb+0x6e/0x210 [<000000009a671b50>] llc_alloc_frame+0x66/0x110 [<00000000012dbf1d>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<0000000037b20905>] llc_conn_state_process+0x1ac/0x640 [<00000000da972b29>] llc_conn_tmr_common_cb+0xe0/0x1b0 [<0000000014e9ff3b>] llc_conn_ack_tmr_cb+0x1e/0x30 [<00000000671607a2>] call_timer_fn+0x45/0x1e0 [<00000000e20d5b8a>] run_timer_softirq+0x262/0x730 [<0000000056ff3549>] __do_softirq+0x115/0x33f [<00000000236c922f>] irq_exit+0xbb/0xe0 [<00000000e56b8c1d>] smp_apic_timer_interrupt+0x96/0x190 [<00000000cfa27900>] apic_timer_interrupt+0xf/0x20 [<0000000093f1d71b>] native_safe_halt+0xe/0x10 [<00000000615642db>] arch_cpu_idle+0xa/0x10 [<00000000fa3482e3>] default_idle_call+0x1e/0x40