Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 25.246896][ T24] audit: type=1800 audit(1561800074.271:33): pid=6852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 25.271479][ T24] audit: type=1800 audit(1561800074.271:34): pid=6852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.443986][ T24] audit: type=1400 audit(1561800082.471:35): avc: denied { map } for pid=7046 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.19' (ECDSA) to the list of known hosts. [ 41.249088][ T24] audit: type=1400 audit(1561800090.281:36): avc: denied { map } for pid=7060 comm="syz-executor129" path="/root/syz-executor129180753" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 53.919357][ T7060] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811f4c6940 (size 64): comm "syz-executor129", pid 7061, jiffies 4294942080 (age 7.830s) hex dump (first 32 bytes): 01 00 00 00 20 69 6f 63 00 00 00 00 64 65 76 2f .... ioc....dev/ 50 69 4c 1f 81 88 ff ff 50 69 4c 1f 81 88 ff ff PiL.....PiL..... backtrace: [<0000000094ee6fcb>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000665ce7cd>] vhost_net_ioctl+0xb43/0xc10 [<0000000008283bb8>] do_vfs_ioctl+0x62a/0x810 [<000000006eb2c712>] ksys_ioctl+0x86/0xb0 [<0000000099780fe6>] __x64_sys_ioctl+0x1e/0x30 [<00000000cad46243>] do_syscall_64+0x76/0x1a0 [<000000003b18fe23>] entry_SYSCALL_64_after_hwframe+0x44/0xa9