[ 28.919179][ T25] audit: type=1800 audit(1580839578.345:34): pid=7170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.928447][ T25] kauditd_printk_skb: 6 callbacks suppressed [ 33.928455][ T25] audit: type=1400 audit(1580839583.375:41): avc: denied { map } for pid=7349 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.63' (ECDSA) to the list of known hosts. [ 42.262782][ T25] audit: type=1400 audit(1580839591.715:42): avc: denied { map } for pid=7363 comm="syz-executor588" path="/root/syz-executor588471401" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 42.290459][ T25] audit: type=1400 audit(1580839591.715:43): avc: denied { integrity } for pid=7363 comm="syz-executor588" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program [ 49.214842][ T25] audit: type=1400 audit(1580839598.665:44): avc: denied { create } for pid=7364 comm="syz-executor588" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 49.240036][ T25] audit: type=1400 audit(1580839598.665:45): avc: denied { write } for pid=7364 comm="syz-executor588" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 executing program [ 61.302199][ T7363] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888114688700 (size 96): comm "syz-executor588", pid 7364, jiffies 4294942189 (age 14.190s) hex dump (first 32 bytes): 40 9c 1c 18 81 88 ff ff 40 9c 1c 18 81 88 ff ff @.......@....... 10 a2 c6 82 ff ff ff ff 00 10 22 25 81 88 ff ff .........."%.... backtrace: [<000000006364bc3b>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000005646d31e>] nft_netdev_hook_alloc+0x3f/0xd0 [<0000000090f541f7>] nf_tables_parse_netdev_hooks+0xaa/0x220 [<00000000d03bdc11>] nf_tables_newflowtable+0x407/0x930 [<000000001278b550>] nfnetlink_rcv_batch+0x353/0x8c0 [<00000000c4090c05>] nfnetlink_rcv+0x189/0x1c0 [<000000002d769b7c>] netlink_unicast+0x223/0x310 [<000000000cbca47f>] netlink_sendmsg+0x2c0/0x570 [<0000000019ca4fce>] sock_sendmsg+0x54/0x70 [<000000005f5c3097>] ____sys_sendmsg+0x2d0/0x300 [<000000003b708fee>] ___sys_sendmsg+0x8a/0xd0 [<000000003682f43a>] __sys_sendmsg+0x80/0xf0 [<00000000983edd44>] __x64_sys_sendmsg+0x23/0x30 [<00000000a2bed369>] do_syscall_64+0x73/0x220 [<00000000b998947a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9