Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 28.314430][ T24] audit: type=1800 audit(1560938746.153:33): pid=6934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [....] startpar: service(s) returned failure: rsyslog ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 38.197875][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 38.197883][ T24] audit: type=1400 audit(1560938756.033:35): avc: denied { map } for pid=7129 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.33' (ECDSA) to the list of known hosts. [ 80.373328][ T24] audit: type=1400 audit(1560938798.203:36): avc: denied { map } for pid=7142 comm="syz-executor090" path="/root/syz-executor090757483" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program [ 110.337620][ T7142] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888128e952c0 (size 632): comm "syz-executor090", pid 7145, jiffies 4294947112 (age 13.660s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 80 c3 18 20 81 88 ff ff 00 00 00 00 00 00 00 00 ... ............ backtrace: [<00000000273aab10>] kmem_cache_alloc+0x134/0x270 [<000000008bedc017>] sock_alloc_inode+0x1d/0xe0 [<000000003d6bef60>] alloc_inode+0x2c/0xe0 [<00000000cde2615d>] new_inode_pseudo+0x18/0x70 [<000000005db9daa2>] sock_alloc+0x1c/0x90 [<00000000e3ac4854>] __sock_create+0x8f/0x250 [<000000002fd291c0>] sock_create_kern+0x3b/0x50 [<0000000011e9a9cd>] smc_create+0xae/0x160 [<0000000027e8e6b1>] __sock_create+0x164/0x250 [<000000003b82d504>] __sys_socket+0x69/0x110 [<0000000016e04dd7>] __x64_sys_socket+0x1e/0x30 [<00000000c4cc9141>] do_syscall_64+0x76/0x1a0 [<00000000dafe4fb4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88812018c380 (size 64): comm "syz-executor090", pid 7145, jiffies 4294947112 (age 13.660s) hex dump (first 32 bytes): 00 00 00 00 6e 66 69 6e 88 c3 18 20 81 88 ff ff ....nfin... .... 88 c3 18 20 81 88 ff ff 00 00 00 00 00 00 00 00 ... ............ backtrace: [<00000000bb565ad4>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000669c5f6a>] sock_alloc_inode+0x44/0xe0 [<000000003d6bef60>] alloc_inode+0x2c/0xe0 [<00000000cde2615d>] new_inode_pseudo+0x18/0x70 [<000000005db9daa2>] sock_alloc+0x1c/0x90 [<00000000e3ac4854>] __sock_create+0x8f/0x250 [<000000002fd291c0>] sock_create_kern+0x3b/0x50 [<0000000011e9a9cd>] smc_create+0xae/0x160 [<0000000027e8e6b1>] __sock_create+0x164/0x250 [<000000003b82d504>] __sys_socket+0x69/0x110 [<0000000016e04dd7>] __x64_sys_socket+0x1e/0x30 [<00000000c4cc9141>] do_syscall_64+0x76/0x1a0 [<00000000dafe4fb4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e037348 (size 56): comm "syz-executor090", pid 7145, jiffies 4294947112 (age 13.660s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ f0 52 e9 28 81 88 ff ff 60 73 03 1e 81 88 ff ff .R.(....`s...... backtrace: [<00000000273aab10>] kmem_cache_alloc+0x134/0x270 [<00000000eac68a16>] security_inode_alloc+0x33/0xb0 [<00000000f7c7c944>] inode_init_always+0x108/0x200 [<00000000ea414c10>] alloc_inode+0x49/0xe0 [<00000000cde2615d>] new_inode_pseudo+0x18/0x70 [<000000005db9daa2>] sock_alloc+0x1c/0x90 [<00000000e3ac4854>] __sock_create+0x8f/0x250 [<000000002fd291c0>] sock_create_kern+0x3b/0x50 [<0000000011e9a9cd>] smc_create+0xae/0x160 [<0000000027e8e6b1>] __sock_create+0x164/0x250 [<000000003b82d504>] __sys_socket+0x69/0x110 [<0000000016e04dd7>] __x64_sys_socket+0x1e/0x30 [<00000000c4cc9141>] do_syscall_64+0x76/0x1a0 [<00000000dafe4fb4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9