[....] Starting file context maintaining daemon: restorecond[ 26.241015][ T25] audit: type=1400 audit(1584184885.171:37): avc: denied { watch } for pid=7086 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [?25l[?1c[ 26.268517][ T25] audit: type=1400 audit(1584184885.171:38): avc: denied { watch } for pid=7086 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 7[ ok 8[?25h[?0c. [ 26.319066][ T25] audit: type=1800 audit(1584184885.251:39): pid=6979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 26.342793][ T25] audit: type=1800 audit(1584184885.271:40): pid=6979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 26.401983][ T25] audit: type=1400 audit(1584184885.331:41): avc: denied { map } for pid=7139 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.183' (ECDSA) to the list of known hosts. syzkaller login: [ 48.579565][ T25] audit: type=1400 audit(1584184907.511:42): avc: denied { map } for pid=7165 comm="syz-executor398" path="/root/syz-executor398605543" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 48.608259][ T25] audit: type=1400 audit(1584184907.511:43): avc: denied { integrity } for pid=7165 comm="syz-executor398" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program executing program executing program executing program [ 78.310754][ T7165] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88812286c400 (size 512): comm "syz-executor398", pid 7168, jiffies 4294943940 (age 13.470s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 c4 86 22 81 88 ff ff ...........".... 08 c4 86 22 81 88 ff ff 18 c4 86 22 81 88 ff ff ...".......".... backtrace: [<000000005d8b4fa0>] rds_message_alloc+0x37/0xc0 [<00000000e2ea7343>] rds_send_probe.constprop.0+0x42/0x380 [<000000003f415173>] rds_recv_incoming+0x485/0x5d0 [<00000000db998d45>] rds_loop_xmit+0x7b/0xf0 [<000000009faaeb18>] rds_send_xmit+0x583/0xb00 [<00000000615cb225>] rds_sendmsg+0x1420/0x16f0 [<00000000edf3ff50>] sock_sendmsg+0x4c/0x60 [<000000006127b19f>] __sys_sendto+0x11d/0x1c0 [<0000000041b0781f>] __x64_sys_sendto+0x26/0x30 [<00000000df0fa579>] do_syscall_64+0x6e/0x220 [<0000000069dbdf7f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9