[ 24.707093][ T26] audit: type=1400 audit(1583558056.274:37): avc: denied { watch } for pid=6982 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 24.738110][ T26] audit: type=1400 audit(1583558056.274:38): avc: denied { watch } for pid=6982 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 24.809499][ T26] audit: type=1800 audit(1583558056.374:39): pid=6895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 24.831357][ T26] audit: type=1800 audit(1583558056.374:40): pid=6895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.237370][ T26] audit: type=1400 audit(1583558057.804:41): avc: denied { map } for pid=7065 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.157' (ECDSA) to the list of known hosts. [ 35.458073][ T26] audit: type=1400 audit(1583558067.024:42): avc: denied { map } for pid=7080 comm="syz-executor298" path="/root/syz-executor298488402" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 35.485440][ T26] audit: type=1400 audit(1583558067.024:43): avc: denied { integrity } for pid=7080 comm="syz-executor298" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program [ 42.207643][ T26] audit: type=1400 audit(1583558073.774:44): avc: denied { create } for pid=7082 comm="syz-executor298" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 42.208383][ T7082] netlink: 3572 bytes leftover after parsing attributes in process `syz-executor298'. [ 42.232816][ T26] audit: type=1400 audit(1583558073.774:45): avc: denied { write } for pid=7082 comm="syz-executor298" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 executing program [ 48.131682][ T7083] netlink: 3572 bytes leftover after parsing attributes in process `syz-executor298'. [ 53.937348][ T7080] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 55.901706][ T7080] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811be16880 (size 96): comm "syz-executor298", pid 7082, jiffies 4294941492 (age 13.760s) hex dump (first 32 bytes): 40 88 b2 1e 81 88 ff ff 40 88 b2 1e 81 88 ff ff @.......@....... e0 b2 ba 82 ff ff ff ff 00 00 76 2a 81 88 ff ff ..........v*.... backtrace: [<00000000c5078aa9>] nft_netdev_hook_alloc+0x3b/0xc0 [<00000000fe41b301>] nf_tables_parse_netdev_hooks+0xa1/0x220 [<0000000048c62001>] nf_tables_newflowtable+0x3c2/0x810 [<00000000c2fb5ad0>] nfnetlink_rcv_batch+0x2f3/0x810 [<00000000976b8cfb>] nfnetlink_rcv+0x183/0x1b0 [<0000000061197fa6>] netlink_unicast+0x20a/0x2f0 [<000000006cc625c3>] netlink_sendmsg+0x2b5/0x560 [<00000000251766d2>] sock_sendmsg+0x4c/0x60 [<00000000238aa22b>] ____sys_sendmsg+0x2c0/0x2f0 [<00000000f1abb009>] ___sys_sendmsg+0x8a/0xd0 [<00000000ea5189e2>] __sys_sendmsg+0x77/0xe0 [<00000000196c7741>] do_syscall_64+0x6e/0x210 [<000000007d4cb6b9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811be16780 (size 96): comm "syz-executor298", pid 7083, jiffies 4294942084 (age 7.840s) hex dump (first 32 bytes): 40 88 b2 1e 81 88 ff ff 40 88 b2 1e 81 88 ff ff @.......@....... e0 b2 ba 82 ff ff ff ff 00 00 76 2a 81 88 ff ff ..........v*.... backtrace: [<00000000c5078aa9>] nft_netdev_hook_alloc+0x3b/0xc0 [<00000000fe41b301>] nf_tables_parse_netdev_hooks+0xa1/0x220 [<0000000048c62001>] nf_tables_newflowtable+0x3c2/0x810 [<00000000c2fb5ad0>] nfnetlink_rcv_batch+0x2f3/0x810 [<00000000976b8cfb>] nfnetlink_rcv+0x183/0x1b0 [<0000000061197fa6>] netlink_unicast+0x20a/0x2f0 [<000000006cc625c3>] netlink_sendmsg+0x2b5/0x560 [<00000000251766d2>] sock_sendmsg+0x4c/0x60 [<00000000238aa22b>] ____sys_sendmsg+0x2c0/0x2f0 [<00000000f1abb009>] ___sys_sendmsg+0x8a/0xd0 [<00000000ea5189e2>] __sys_sendmsg+0x77/0xe0 [<00000000196c7741>] do_syscall_64+0x6e/0x210 [<000000007d4cb6b9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9