[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[ 27.047393][ T25] audit: type=1400 audit(1571127907.275:37): avc: denied { watch } for pid=6898 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [?25l[?1c[ 27.071558][ T25] audit: type=1400 audit(1571127907.275:38): avc: denied { watch } for pid=6898 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 7[ ok 8[?25h[?0c. [ 27.117234][ T25] audit: type=1800 audit(1571127907.345:39): pid=6809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 27.139370][ T25] audit: type=1800 audit(1571127907.355:40): pid=6809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.272988][ T25] audit: type=1400 audit(1571127909.505:41): avc: denied { map } for pid=6979 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.34' (ECDSA) to the list of known hosts. [ 37.285278][ T25] audit: type=1400 audit(1571127917.515:42): avc: denied { map } for pid=6993 comm="syz-executor844" path="/root/syz-executor844720045" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program [ 71.051239][ T3780] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811773a600 (size 224): comm "syz-executor844", pid 6997, jiffies 4294943464 (age 11.950s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 12 2a 81 88 ff ff 00 28 55 21 81 88 ff ff .0.*.....(U!.... backtrace: [<00000000bc06ea02>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000fb23669e>] __alloc_skb+0x6e/0x210 [<000000000e7fbf96>] llc_alloc_frame+0x66/0x110 [<000000008e46d5e4>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000dce392d7>] llc_conn_state_process+0x1ac/0x640 [<000000003c4d5752>] llc_establish_connection+0x110/0x170 [<000000004cef9c09>] llc_ui_connect+0x10e/0x370 [<00000000ba2b6cc6>] __sys_connect+0x11d/0x170 [<00000000ce36dc46>] __x64_sys_connect+0x1e/0x30 [<0000000068f6bb07>] do_syscall_64+0x73/0x1f0 [<00000000720869f3>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881145e9800 (size 512): comm "syz-executor844", pid 6997, jiffies 4294943464 (age 11.950s) hex dump (first 32 bytes): 01 80 c2 00 00 00 00 00 00 00 00 00 00 03 00 c4 ................ 7f 75 61 6c 2f 74 74 79 2f 70 74 79 63 35 00 41 .ual/tty/ptyc5.A backtrace: [<000000005e3a7a0b>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<00000000297189ee>] __kmalloc_node_track_caller+0x38/0x50 [<00000000808d75f7>] __kmalloc_reserve.isra.0+0x40/0xb0 [<00000000e5a8e5f3>] __alloc_skb+0xa0/0x210 [<000000000e7fbf96>] llc_alloc_frame+0x66/0x110 [<000000008e46d5e4>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000dce392d7>] llc_conn_state_process+0x1ac/0x640 [<000000003c4d5752>] llc_establish_connection+0x110/0x170 [<000000004cef9c09>] llc_ui_connect+0x10e/0x370 [<00000000ba2b6cc6>] __sys_connect+0x11d/0x170 [<00000000ce36dc46>] __x64_sys_connect+0x1e/0x30 [<0000000068f6bb07>] do_syscall_64+0x73/0x1f0 [<00000000720869f3>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811773a900 (size 224): comm "softirq", pid 0, jiffies 4294943568 (age 10.910s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 12 2a 81 88 ff ff 00 28 55 21 81 88 ff ff .0.*.....(U!.... backtrace: [<00000000bc06ea02>] kmem_cache_alloc_node+0x163/0x2f0 [<00000000fb23669e>] __alloc_skb+0x6e/0x210 [<000000000e7fbf96>] llc_alloc_frame+0x66/0x110 [<000000008e46d5e4>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000dce392d7>] llc_conn_state_process+0x1ac/0x640 [<00000000883ea569>] llc_conn_tmr_common_cb+0xe0/0x1b0 [<000000007c9a39f8>] llc_conn_ack_tmr_cb+0x1e/0x30 [<0000000001ef3543>] call_timer_fn+0x45/0x1e0 [<00000000c360338f>] run_timer_softirq+0x262/0x730 [<0000000050434a2e>] __do_softirq+0x115/0x33f [<0000000059b045b1>] irq_exit+0xbb/0xe0 [<00000000724cdcf7>] smp_apic_timer_interrupt+0x96/0x190 [<00000000841ab66e>] apic_timer_interrupt+0xf/0x20 [<00000000143be98b>] native_safe_halt+0xe/0x10 [<00000000a7e730d2>] arch_cpu_idle+0xa/0x10 [<00000000a965ebbb>] default_idle_call+0x1e/0x40