[ 29.577758][ T25] audit: type=1400 audit(1583555602.250:37): avc: denied { watch } for pid=7170 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 29.603066][ T25] audit: type=1400 audit(1583555602.250:38): avc: denied { watch } for pid=7170 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 29.773022][ T25] audit: type=1800 audit(1583555602.440:39): pid=7080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 29.794845][ T25] audit: type=1800 audit(1583555602.440:40): pid=7080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 31.062083][ T25] audit: type=1400 audit(1583555603.730:41): avc: denied { map } for pid=7250 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.117' (ECDSA) to the list of known hosts. [ 37.102118][ T25] audit: type=1400 audit(1583555609.770:42): avc: denied { map } for pid=7264 comm="syz-executor577" path="/root/syz-executor577060737" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 37.129120][ T25] audit: type=1400 audit(1583555609.770:43): avc: denied { integrity } for pid=7264 comm="syz-executor577" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program [ 43.784954][ T7266] IPVS: ftp: loaded support on port[0] = 21 executing program executing program [ 56.139957][ T7266] kmemleak: 60 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 62.864029][ T7266] kmemleak: 54 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888121a59300 (size 256): comm "syz-executor577", pid 7272, jiffies 4294942228 (age 13.370s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000a28b9b36>] tcindex_alloc_perfect_hash+0x8d/0xf0 [<00000000d1086c4d>] tcindex_set_parms+0x86d/0x990 [<00000000cceece1a>] tcindex_change+0xcf/0x110 [<00000000cc0f3c9c>] tc_new_tfilter+0x4d4/0xdc0 [<00000000aa81ecd5>] rtnetlink_rcv_msg+0x3a5/0x4b0 [<00000000d19ab25b>] netlink_rcv_skb+0x5a/0x180 [<00000000f4e455c1>] netlink_unicast+0x20a/0x2f0 [<00000000ffd89c54>] netlink_sendmsg+0x2b5/0x560 [<000000009e2e92c7>] sock_sendmsg+0x4c/0x60 [<000000001ec0a47b>] ____sys_sendmsg+0x2c0/0x2f0 [<00000000178327ff>] ___sys_sendmsg+0x8a/0xd0 [<000000004a70794e>] __sys_sendmsg+0x77/0xe0 [<00000000f0ff114e>] do_syscall_64+0x6e/0x210 [<00000000c0d56491>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888121a59400 (size 256): comm "syz-executor577", pid 7272, jiffies 4294942228 (age 13.370s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000a28b9b36>] tcindex_alloc_perfect_hash+0x8d/0xf0 [<00000000d1086c4d>] tcindex_set_parms+0x86d/0x990 [<00000000cceece1a>] tcindex_change+0xcf/0x110 [<00000000cc0f3c9c>] tc_new_tfilter+0x4d4/0xdc0 [<00000000aa81ecd5>] rtnetlink_rcv_msg+0x3a5/0x4b0 [<00000000d19ab25b>] netlink_rcv_skb+0x5a/0x180 [<00000000f4e455c1>] netlink_unicast+0x20a/0x2f0 [<00000000ffd89c54>] netlink_sendmsg+0x2b5/0x560 [<000000009e2e92c7>] sock_sendmsg+0x4c/0x60 [<000000001ec0a47b>] ____sys_sendmsg+0x2c0/0x2f0 [<00000000178327ff>] ___sys_sendmsg+0x8a/0xd0 [<000000004a70794e>] __sys_sendmsg+0x77/0xe0 [<00000000f0ff114e>] do_syscall_64+0x6e/0x210 [<00000000c0d56491>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888121a59500 (size 256): comm "syz-executor577", pid 7272, jiffies 4294942228 (age 13.370s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000a28b9b36>] tcindex_alloc_perfect_hash+0x8d/0xf0 [<00000000d1086c4d>] tcindex_set_parms+0x86d/0x990 [<00000000cceece1a>] tcindex_change+0xcf/0x110 [<00000000cc0f3c9c>] tc_new_tfilter+0x4d4/0xdc0 [<00000000aa81ecd5>] rtnetlink_rcv_msg+0x3a5/0x4b0 [<00000000d19ab25b>] netlink_rcv_skb+0x5a/0x180 [<00000000f4e455c1>] netlink_unicast+0x20a/0x2f0 [<00000000ffd89c54>] netlink_sendmsg+0x2b5/0x560 [<000000009e2e92c7>] sock_sendmsg+0x4c/0x60 [<000000001ec0a47b>] ____sys_sendmsg+0x2c0/0x2f0 [<00000000178327ff>] ___sys_sendmsg+0x8a/0xd0 [<000000004a70794e>] __sys_sendmsg+0x77/0xe0 [<00000000f0ff114e>] do_syscall_64+0x6e/0x210 [<00000000c0d56491>] entry_SYSCALL_64_after_hwframe+0x44/0xa9