[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 26.637921][ T24] audit: type=1800 audit(1559944329.594:33): pid=6837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 26.659751][ T24] audit: type=1800 audit(1559944329.594:34): pid=6837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 36.137113][ T24] audit: type=1400 audit(1559944339.084:35): avc: denied { map } for pid=7032 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.44' (ECDSA) to the list of known hosts. [ 68.228565][ T24] audit: type=1400 audit(1559944371.184:36): avc: denied { map } for pid=7045 comm="syz-executor393" path="/root/syz-executor393789936" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 75.471619][ T7046] IPVS: ftp: loaded support on port[0] = 21 executing program [ 81.996207][ T7046] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 86.145276][ T7046] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 88.371399][ T7046] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88812aace800 (size 512): comm "softirq", pid 0, jiffies 4294944812 (age 12.890s) hex dump (first 32 bytes): 38 f8 75 20 81 88 ff ff 38 f8 75 20 81 88 ff ff 8.u ....8.u .... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000222d3792>] kmem_cache_alloc_node+0x153/0x2a0 [<000000006a13b4dd>] __alloc_skb+0x6e/0x210 [<000000004573f62e>] tipc_buf_acquire+0x2f/0x80 [<00000000223bfe9a>] tipc_msg_create+0x37/0xe0 [<000000005bd69742>] tipc_group_create_event+0xb3/0x1b0 [<00000000e8d52735>] tipc_group_proto_rcv+0x569/0x640 [<0000000088a4babf>] tipc_sk_filter_rcv+0x9ac/0xf20 [<00000000867791c6>] tipc_sk_rcv+0x494/0x8a0 [<0000000014493586>] tipc_node_xmit+0x196/0x1f0 [<0000000075098e9e>] tipc_node_distr_xmit+0x7d/0x120 [<0000000069028058>] tipc_group_delete+0xe6/0x130 [<00000000d7033c6d>] tipc_sk_leave+0x57/0xb0 [<00000000076c5f97>] tipc_release+0x7b/0x5e0 [<00000000d28a5a2d>] __sock_release+0x4b/0xe0 [<00000000e1b5482d>] sock_close+0x1b/0x30 [<00000000a5f7a284>] __fput+0xed/0x300 BUG: memory leak unreferenced object 0xffff888121330800 (size 1024): comm "softirq", pid 0, jiffies 4294944812 (age 12.890s) hex dump (first 32 bytes): 2f 74 6d 70 00 54 4d 50 44 49 52 00 25 2e 2a 73 /tmp.TMPDIR.%.*s 2f 25 2e 2a 73 58 58 58 58 58 58 00 2e 2e 2f 73 /%.*sXXXXXX.../s backtrace: [<000000005a5e60ea>] kmem_cache_alloc_node_trace+0x15b/0x2a0 [<0000000075811fe9>] __kmalloc_node_track_caller+0x38/0x50 [<00000000401f6afb>] __kmalloc_reserve.isra.0+0x40/0xb0 [<00000000e125f9a1>] __alloc_skb+0xa0/0x210 [<000000004573f62e>] tipc_buf_acquire+0x2f/0x80 [<00000000223bfe9a>] tipc_msg_create+0x37/0xe0 [<000000005bd69742>] tipc_group_create_event+0xb3/0x1b0 [<00000000e8d52735>] tipc_group_proto_rcv+0x569/0x640 [<0000000088a4babf>] tipc_sk_filter_rcv+0x9ac/0xf20 [<00000000867791c6>] tipc_sk_rcv+0x494/0x8a0 [<0000000014493586>] tipc_node_xmit+0x196/0x1f0 [<0000000075098e9e>] tipc_node_distr_xmit+0x7d/0x120 [<0000000069028058>] tipc_group_delete+0xe6/0x130 [<00000000d7033c6d>] tipc_sk_leave+0x57/0xb0 [<00000000076c5f97>] tipc_release+0x7b/0x5e0 [<00000000d28a5a2d>] __sock_release+0x4b/0xe0 BUG: memory leak unreferenced object 0xffff888115854e00 (size 512): comm "softirq", pid 0, jiffies 4294945347 (age 7.540s) hex dump (first 32 bytes): b8 f3 75 20 81 88 ff ff b8 f3 75 20 81 88 ff ff ..u ......u .... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000222d3792>] kmem_cache_alloc_node+0x153/0x2a0 [<000000006a13b4dd>] __alloc_skb+0x6e/0x210 [<000000004573f62e>] tipc_buf_acquire+0x2f/0x80 [<00000000223bfe9a>] tipc_msg_create+0x37/0xe0 [<000000005bd69742>] tipc_group_create_event+0xb3/0x1b0 [<00000000e8d52735>] tipc_group_proto_rcv+0x569/0x640 [<0000000088a4babf>] tipc_sk_filter_rcv+0x9ac/0xf20 [<00000000867791c6>] tipc_sk_rcv+0x494/0x8a0 [<0000000014493586>] tipc_node_xmit+0x196/0x1f0 [<0000000075098e9e>] tipc_node_distr_xmit+0x7d/0x120 [<0000000069028058>] tipc_group_delete+0xe6/0x130 [<00000000d7033c6d>] tipc_sk_leave+0x57/0xb0 [<00000000076c5f97>] tipc_release+0x7b/0x5e0 [<00000000d28a5a2d>] __sock_release+0x4b/0xe0 [<00000000e1b5482d>] sock_close+0x1b/0x30 [<00000000a5f7a284>] __fput+0xed/0x300