Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 27.527143][ T24] audit: type=1800 audit(1561204008.885:33): pid=6949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.257939][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 32.257946][ T24] audit: type=1400 audit(1561204013.615:35): avc: denied { map } for pid=7147 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.26' (ECDSA) to the list of known hosts. [ 38.458688][ T24] audit: type=1400 audit(1561204019.815:36): avc: denied { map } for pid=7161 comm="syz-executor360" path="/root/syz-executor360688386" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 45.753051][ T7164] FAULT_INJECTION: forcing a failure. [ 45.753051][ T7164] name failslab, interval 1, probability 0, space 0, times 1 [ 45.766018][ T7164] CPU: 0 PID: 7164 Comm: syz-executor360 Not tainted 5.2.0-rc5+ #39 [ 45.774641][ T7164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 45.784785][ T7164] Call Trace: [ 45.788105][ T7164] dump_stack+0xaa/0xd6 [ 45.792281][ T7164] should_fail.cold+0x3c/0x49 [ 45.796958][ T7164] __should_failslab+0x65/0xa0 [ 45.801698][ T7164] should_failslab+0x9/0x14 [ 45.806173][ T7164] kmem_cache_alloc_trace+0x2d/0x280 [ 45.811458][ T7164] sctp_auth_shkey_create+0x49/0xa0 [ 45.816647][ T7164] sctp_endpoint_new+0x1b1/0x470 [ 45.821573][ T7164] sctp_init_sock+0x20b/0x360 [ 45.826237][ T7164] sctp_v4_create_accept_sk+0x7e/0xb0 [ 45.831669][ T7164] sctp_accept+0x1df/0x290 [ 45.836239][ T7164] ? finish_wait+0x80/0x80 [ 45.840790][ T7164] inet_accept+0x4e/0x1d0 [ 45.845119][ T7164] __sys_accept4+0x12a/0x280 [ 45.849689][ T7164] ? __sb_end_write+0x68/0x90 [ 45.854430][ T7164] ? fput_many+0x87/0xc0 [ 45.858693][ T7164] ? fput+0x1b/0x20 [ 45.862479][ T7164] ? ksys_write+0xb0/0x130 [ 45.866873][ T7164] __x64_sys_accept4+0x22/0x30 [ 45.871658][ T7164] do_syscall_64+0x76/0x1a0 [ 45.876243][ T7164] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 45.882118][ T7164] RIP: 0033:0x446a79 [ 45.885983][ T7164] Code: e8 6c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 45.905813][ T7164] RSP: 002b:00007f7c51fbcd88 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 45.914290][ T7164] RAX: ffffffffffffffda RBX: 00000000006fbc38 RCX: 0000000000446a79 [ 45.922380][ T7164] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 45.930540][ T7164] RBP: 00000000006fbc30 R08: 0000000000000002 R09: 0000000000003231 [ 45.938681][ T7164] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006fbc3c [ 45.946748][ T7164] R13: 00007f7c51fbcd90 R14: 0000000000000005 R15: 20c49ba5e353f7cf executing program [ 51.379180][ T7172] FAULT_INJECTION: forcing a failure. [ 51.379180][ T7172] name failslab, interval 1, probability 0, space 0, times 0 [ 51.392137][ T7172] CPU: 1 PID: 7172 Comm: syz-executor360 Not tainted 5.2.0-rc5+ #39 [ 51.400462][ T7172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.410887][ T7172] Call Trace: [ 51.414310][ T7172] dump_stack+0xaa/0xd6 [ 51.418505][ T7172] should_fail.cold+0x3c/0x49 [ 51.423242][ T7172] __should_failslab+0x65/0xa0 [ 51.427996][ T7172] should_failslab+0x9/0x14 [ 51.432490][ T7172] kmem_cache_alloc_trace+0x2d/0x280 [ 51.437767][ T7172] sctp_add_bind_addr+0x5d/0x1a0 [ 51.442887][ T7172] sctp_bind_addr_dup+0x5e/0x80 [ 51.447717][ T7172] sctp_sock_migrate+0x144/0x4b0 [ 51.452747][ T7172] sctp_accept+0x1ff/0x290 [ 51.457189][ T7172] ? finish_wait+0x80/0x80 [ 51.461591][ T7172] inet_accept+0x4e/0x1d0 [ 51.465905][ T7172] __sys_accept4+0x12a/0x280 [ 51.470475][ T7172] ? __sb_end_write+0x68/0x90 [ 51.475277][ T7172] ? fput_many+0x87/0xc0 [ 51.479696][ T7172] ? fput+0x1b/0x20 [ 51.483476][ T7172] ? ksys_write+0xb0/0x130 [ 51.487970][ T7172] __x64_sys_accept4+0x22/0x30 [ 51.492725][ T7172] do_syscall_64+0x76/0x1a0 [ 51.497246][ T7172] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 51.503301][ T7172] RIP: 0033:0x446a79 [ 51.507237][ T7172] Code: e8 6c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 51.527221][ T7172] RSP: 002b:00007f7c51fbcd88 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 51.536050][ T7172] RAX: ffffffffffffffda RBX: 00000000006fbc38 RCX: 0000000000446a79 [ 51.544210][ T7172] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 51.552160][ T7172] RBP: 00000000006fbc30 R08: 0000000000000002 R09: 0000000000003231 [ 51.560242][ T7172] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006fbc3c [ 51.568256][ T7172] R13: 00007f7c51fbcd90 R14: 0000000000000005 R15: 20c49ba5e353f7cf [ 52.548591][ T7161] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888118137680 (size 1352): comm "syz-executor360", pid 7164, jiffies 4294941839 (age 13.960s) hex dump (first 32 bytes): ac 14 ff aa 0a 80 01 1a 00 00 00 00 00 00 00 00 ................ 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000006c358063>] kmem_cache_alloc+0x134/0x270 [<00000000f2fb26e7>] sk_prot_alloc+0x41/0x170 [<000000003c036edc>] sk_alloc+0x35/0x2f0 [<00000000c25725a4>] sctp_v4_create_accept_sk+0x32/0xb0 [<0000000049bd7e55>] sctp_accept+0x1df/0x290 [<00000000d287a63e>] inet_accept+0x4e/0x1d0 [<00000000acb0fc20>] __sys_accept4+0x12a/0x280 [<00000000bbdaf60b>] __x64_sys_accept4+0x22/0x30 [<000000006da547ee>] do_syscall_64+0x76/0x1a0 [<00000000025f5c93>] entry_SYSCALL_64_after_hwframe+0x44/0xa9