[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 23.854094][ T24] kauditd_printk_skb: 16 callbacks suppressed [ 23.854099][ T24] audit: type=1800 audit(1558728971.066:33): pid=6761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 23.882409][ T24] audit: type=1800 audit(1558728971.066:34): pid=6761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.051552][ T24] audit: type=1400 audit(1558728975.256:35): avc: denied { map } for pid=6963 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.220' (ECDSA) to the list of known hosts. [ 65.503376][ T24] audit: type=1400 audit(1558729012.716:36): avc: denied { map } for pid=6979 comm="syz-executor260" path="/root/syz-executor260124968" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 72.496738][ T6980] IPVS: ftp: loaded support on port[0] = 21 [ 74.389004][ T24] audit: type=1400 audit(1558729021.596:37): avc: denied { map } for pid=6985 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 executing program [ 83.694465][ T6980] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88812aa93400 (size 512): comm "softirq", pid 0, jiffies 4294944530 (age 13.240s) hex dump (first 32 bytes): b8 22 2b 20 81 88 ff ff b8 22 2b 20 81 88 ff ff ."+ ....."+ .... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000007d55ce54>] kmem_cache_alloc_node+0x153/0x2a0 [<00000000a858adad>] __alloc_skb+0x6e/0x210 [<00000000463edff9>] tipc_buf_acquire+0x2f/0x80 [<00000000177ac039>] tipc_msg_create+0x37/0xe0 [<0000000099f48f69>] tipc_group_create_event+0xb3/0x1b0 [<0000000079898fd8>] tipc_group_proto_rcv+0x569/0x640 [<000000007b046607>] tipc_sk_filter_rcv+0x9ac/0xf20 [<00000000fb6917a3>] tipc_sk_rcv+0x494/0x8a0 [<000000009f025e8a>] tipc_node_xmit+0x196/0x1f0 [<00000000cec0970a>] tipc_node_distr_xmit+0x7d/0x120 [<00000000ba42e4c6>] tipc_group_delete+0xe6/0x130 [<00000000c1289dc7>] tipc_sk_leave+0x57/0xb0 [<0000000023e55fea>] tipc_release+0x7b/0x5e0 [<00000000a6848069>] __sock_release+0x4b/0xe0 [<0000000043f01d60>] sock_close+0x1b/0x30 [<0000000021f57458>] __fput+0xed/0x300 BUG: memory leak unreferenced object 0xffff888120dec800 (size 1024): comm "softirq", pid 0, jiffies 4294944530 (age 13.240s) hex dump (first 32 bytes): 61 64 64 40 2f 64 65 76 69 63 65 73 2f 70 6c 61 add@/devices/pla 74 66 6f 72 6d 2f 76 69 76 69 64 2e 30 2f 76 69 tform/vivid.0/vi backtrace: [<000000007531f41d>] kmem_cache_alloc_node_trace+0x15b/0x2a0 [<000000003dcb0277>] __kmalloc_node_track_caller+0x38/0x50 [<00000000099f1c7a>] __kmalloc_reserve.isra.0+0x40/0xb0 [<000000005b8cf0f9>] __alloc_skb+0xa0/0x210 [<00000000463edff9>] tipc_buf_acquire+0x2f/0x80 [<00000000177ac039>] tipc_msg_create+0x37/0xe0 [<0000000099f48f69>] tipc_group_create_event+0xb3/0x1b0 [<0000000079898fd8>] tipc_group_proto_rcv+0x569/0x640 [<000000007b046607>] tipc_sk_filter_rcv+0x9ac/0xf20 [<00000000fb6917a3>] tipc_sk_rcv+0x494/0x8a0 [<000000009f025e8a>] tipc_node_xmit+0x196/0x1f0 [<00000000cec0970a>] tipc_node_distr_xmit+0x7d/0x120 [<00000000ba42e4c6>] tipc_group_delete+0xe6/0x130 [<00000000c1289dc7>] tipc_sk_leave+0x57/0xb0 [<0000000023e55fea>] tipc_release+0x7b/0x5e0 [<00000000a6848069>] __sock_release+0x4b/0xe0