[....] Starting file context maintaining dae[ 23.694744][ T22] kauditd_printk_skb: 16 callbacks suppressed mon: restorecond[ 23.694750][ T22] audit: type=1400 audit(1571278259.908:37): avc: denied { watch } for pid=6855 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 23.726790][ T22] audit: type=1400 audit(1571278259.908:38): avc: denied { watch } for pid=6855 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [ 23.769200][ T22] audit: type=1800 audit(1571278259.978:39): pid=6754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 23.790743][ T22] audit: type=1800 audit(1571278259.978:40): pid=6754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.622005][ T22] audit: type=1400 audit(1571278265.838:41): avc: denied { map } for pid=6942 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.7' (ECDSA) to the list of known hosts. [ 69.634180][ T22] audit: type=1400 audit(1571278305.848:42): avc: denied { map } for pid=6957 comm="syz-executor372" path="/root/syz-executor372177170" dev="sda1" ino=16461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.318105][ T6957] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 135.213522][ T6957] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888129791d00 (size 224): comm "syz-executor372", pid 6962, jiffies 4294947272 (age 37.270s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 60 45 2a 81 88 ff ff 00 d8 86 17 81 88 ff ff .`E*............ backtrace: [<00000000777fae77>] kmem_cache_alloc_node+0x163/0x2f0 [<0000000076be091c>] __alloc_skb+0x6e/0x210 [<000000009d1f6c69>] llc_alloc_frame+0x66/0x110 [<0000000021de1287>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<000000006cc33734>] llc_conn_state_process+0x1ac/0x640 [<0000000021140d2e>] llc_establish_connection+0x110/0x170 [<00000000d44b6e10>] llc_ui_connect+0x10e/0x370 [<00000000e003df92>] __sys_connect+0x11d/0x170 [<000000003055101c>] __x64_sys_connect+0x1e/0x30 [<000000003ab42cd9>] do_syscall_64+0x73/0x1f0 [<00000000f96525fc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888122ea4400 (size 512): comm "syz-executor372", pid 6962, jiffies 4294947272 (age 37.270s) hex dump (first 32 bytes): 00 00 00 00 00 00 b6 71 fb 0f 9d 85 00 03 00 c8 .......q........ 7f 75 61 6c 2f 74 74 79 2f 70 74 79 72 61 00 41 .ual/tty/ptyra.A backtrace: [<000000005ccf1a5b>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<00000000b7d7c2ab>] __kmalloc_node_track_caller+0x38/0x50 [<000000000d096113>] __kmalloc_reserve.isra.0+0x40/0xb0 [<00000000526851c9>] __alloc_skb+0xa0/0x210 [<000000009d1f6c69>] llc_alloc_frame+0x66/0x110 [<0000000021de1287>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<000000006cc33734>] llc_conn_state_process+0x1ac/0x640 [<0000000021140d2e>] llc_establish_connection+0x110/0x170 [<00000000d44b6e10>] llc_ui_connect+0x10e/0x370 [<00000000e003df92>] __sys_connect+0x11d/0x170 [<000000003055101c>] __x64_sys_connect+0x1e/0x30 [<000000003ab42cd9>] do_syscall_64+0x73/0x1f0 [<00000000f96525fc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888129791e00 (size 224): comm "syz-executor372", pid 6963, jiffies 4294947861 (age 31.380s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 60 45 2a 81 88 ff ff 00 50 da 0e 81 88 ff ff .`E*.....P...... backtrace: [<00000000777fae77>] kmem_cache_alloc_node+0x163/0x2f0 [<0000000076be091c>] __alloc_skb+0x6e/0x210 [<000000009d1f6c69>] llc_alloc_frame+0x66/0x110 [<0000000021de1287>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<000000006cc33734>] llc_conn_state_process+0x1ac/0x640 [<0000000021140d2e>] llc_establish_connection+0x110/0x170 [<00000000d44b6e10>] llc_ui_connect+0x10e/0x370 [<00000000e003df92>] __sys_connect+0x11d/0x170 [<000000003055101c>] __x64_sys_connect+0x1e/0x30 [<000000003ab42cd9>] do_syscall_64+0x73/0x1f0 [<00000000f96525fc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881226f5800 (size 2048): comm "syz-executor372", pid 6964, jiffies 4294948450 (age 25.490s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1a 00 02 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000b1dbe95b>] __kmalloc+0x169/0x300 [<00000000f10f55c2>] sk_prot_alloc+0x112/0x170 [<00000000f06e5acd>] sk_alloc+0x35/0x2f0 [<000000009ac78035>] llc_sk_alloc+0x35/0x170 [<00000000e2ae7b27>] llc_ui_create+0x7b/0x150 [<000000009d6622f4>] __sock_create+0x164/0x250 [<0000000078563c79>] __sys_socket+0x69/0x110 [<0000000012a1cf5f>] __x64_sys_socket+0x1e/0x30 [<000000003ab42cd9>] do_syscall_64+0x73/0x1f0 [<00000000f96525fc>] entry_SYSCALL_64_after_hwframe+0x44/0xa9