[ 25.211630][ T25] audit: type=1400 audit(1570907768.000:37): avc: denied { watch } for pid=6969 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 25.244015][ T25] audit: type=1400 audit(1570907768.000:38): avc: denied { watch } for pid=6969 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 25.386956][ T25] audit: type=1800 audit(1570907768.180:39): pid=6868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 25.412609][ T25] audit: type=1800 audit(1570907768.180:40): pid=6868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.876756][ T25] audit: type=1400 audit(1570907769.670:41): avc: denied { map } for pid=7052 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.243' (ECDSA) to the list of known hosts. [ 48.031987][ T25] audit: type=1400 audit(1570907790.820:42): avc: denied { map } for pid=7068 comm="syz-executor067" path="/root/syz-executor067852447" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program [ 78.525378][ T7068] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 79.022607][ T25] audit: type=1400 audit(1570907821.810:43): avc: denied { map } for pid=7075 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 BUG: memory leak unreferenced object 0xffff88811519e600 (size 224): comm "syz-executor067", pid 7072, jiffies 4294944490 (age 12.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 d9 2a 81 88 ff ff 00 68 b9 28 81 88 ff ff .0.*.....h.(.... backtrace: [<00000000d074062a>] kmem_cache_alloc_node+0x163/0x2f0 [<0000000087aae0cc>] __alloc_skb+0x6e/0x210 [<0000000038415df4>] llc_alloc_frame+0x66/0x110 [<00000000dc08338b>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000fb6d87d8>] llc_conn_state_process+0x1ac/0x640 [<000000006e34dd0d>] llc_establish_connection+0x110/0x170 [<0000000025f7ea75>] llc_ui_connect+0x10e/0x370 [<000000006e08cb1e>] __sys_connect+0x11d/0x170 [<000000000e8b0747>] __x64_sys_connect+0x1e/0x30 [<00000000a4b4736d>] do_syscall_64+0x73/0x1f0 [<00000000214f5cc5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115147800 (size 512): comm "syz-executor067", pid 7072, jiffies 4294944490 (age 12.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 06 80 2f 0a 55 de 00 03 00 c6 ......../.U..... 7f 00 00 00 93 00 00 00 a7 4d 3c c8 00 00 00 00 .........M<..... backtrace: [<000000000eebed59>] kmem_cache_alloc_node_trace+0x161/0x2f0 [<00000000c7632cac>] __kmalloc_node_track_caller+0x38/0x50 [<00000000ad322e55>] __kmalloc_reserve.isra.0+0x40/0xb0 [<000000000ba3232c>] __alloc_skb+0xa0/0x210 [<0000000038415df4>] llc_alloc_frame+0x66/0x110 [<00000000dc08338b>] llc_conn_ac_send_sabme_cmd_p_set_x+0x2f/0x140 [<00000000fb6d87d8>] llc_conn_state_process+0x1ac/0x640 [<000000006e34dd0d>] llc_establish_connection+0x110/0x170 [<0000000025f7ea75>] llc_ui_connect+0x10e/0x370 [<000000006e08cb1e>] __sys_connect+0x11d/0x170 [<000000000e8b0747>] __x64_sys_connect+0x1e/0x30 [<00000000a4b4736d>] do_syscall_64+0x73/0x1f0 [<00000000214f5cc5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9