[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 24.780212][ T24] kauditd_printk_skb: 16 callbacks suppressed [ 24.780218][ T24] audit: type=1800 audit(1558998617.674:33): pid=6781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 24.807876][ T24] audit: type=1800 audit(1558998617.674:34): pid=6781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.018276][ T24] audit: type=1400 audit(1558998624.914:35): avc: denied { map } for pid=6975 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. [ 52.868047][ T24] audit: type=1400 audit(1558998645.764:36): avc: denied { map } for pid=6989 comm="syz-executor364" path="/root/syz-executor364939591" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 59.580384][ T6990] IPVS: ftp: loaded support on port[0] = 21 executing program executing program executing program executing program executing program [ 95.427241][ T6990] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881178e3a00 (size 224): comm "softirq", pid 0, jiffies 4294943233 (age 37.930s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 40 2e 15 81 88 ff ff 00 00 00 00 00 00 00 00 .@.............. backtrace: [<000000003c5bc1cb>] kmem_cache_alloc+0x134/0x270 [<000000008d9cad53>] __build_skb+0x26/0x70 [<0000000080be0e1c>] __napi_alloc_skb+0xf8/0x150 [<00000000055bb149>] napi_get_frags+0x3f/0x70 [<00000000776c98ba>] tun_get_user+0x636/0x1a20 [<000000008cd40711>] tun_chr_write_iter+0x53/0x90 [<0000000015105873>] do_iter_readv_writev+0x210/0x2e0 [<00000000631300d5>] do_iter_write+0xb9/0x230 [<00000000505144af>] vfs_writev+0xcb/0x130 [<00000000a5178dd9>] do_writev+0x89/0x180 [<0000000056e3ae5d>] __x64_sys_writev+0x20/0x30 [<0000000092533f11>] do_syscall_64+0x76/0x1a0 [<000000008b80cb1b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811a4a9400 (size 1024): comm "syz-executor364", pid 6991, jiffies 4294943233 (age 37.930s) hex dump (first 32 bytes): 10 98 45 81 ff ff ff ff d2 c8 46 81 ff ff ff ff ..E.......F..... aa fe 46 81 ff ff ff ff b3 2c 45 81 ff ff ff ff ..F......,E..... backtrace: [<000000000bd8770d>] kmem_cache_alloc_node_trace+0x15b/0x2a0 [<000000006e09a3c9>] __kmalloc_node_track_caller+0x38/0x50 [<000000002e072ebb>] __kmalloc_reserve.isra.0+0x40/0xb0 [<000000002c865dda>] pskb_expand_head+0x82/0x3a0 [<0000000012f9b678>] tun_get_user+0xdc5/0x1a20 [<000000008cd40711>] tun_chr_write_iter+0x53/0x90 [<0000000015105873>] do_iter_readv_writev+0x210/0x2e0 [<00000000631300d5>] do_iter_write+0xb9/0x230 [<00000000505144af>] vfs_writev+0xcb/0x130 [<00000000a5178dd9>] do_writev+0x89/0x180 [<0000000056e3ae5d>] __x64_sys_writev+0x20/0x30 [<0000000092533f11>] do_syscall_64+0x76/0x1a0 [<000000008b80cb1b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9