[ 25.252446][ T24] audit: type=1400 audit(1571101653.174:37): avc: denied { watch } for pid=6892 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 25.285976][ T24] audit: type=1400 audit(1571101653.174:38): avc: denied { watch } for pid=6892 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 25.385235][ T24] audit: type=1800 audit(1571101653.314:39): pid=6800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 25.407743][ T24] audit: type=1800 audit(1571101653.314:40): pid=6800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.745858][ T24] audit: type=1400 audit(1571101654.674:41): avc: denied { map } for pid=6972 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.120' (ECDSA) to the list of known hosts. [ 55.746161][ T24] audit: type=1400 audit(1571101683.674:42): avc: denied { map } for pid=6988 comm="syz-executor390" path="/root/syz-executor390558858" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 62.466825][ T6989] IPVS: ftp: loaded support on port[0] = 21 [ 62.486002][ T6989] chnl_net:caif_netlink_parms(): no params data found [ 62.497702][ T6989] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.504876][ T6989] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.512516][ T6989] device bridge_slave_0 entered promiscuous mode [ 62.519245][ T6989] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.526387][ T6989] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.534084][ T6989] device bridge_slave_1 entered promiscuous mode [ 62.542880][ T6989] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.553306][ T6989] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.564751][ T6989] team0: Port device team_slave_0 added [ 62.570680][ T6989] team0: Port device team_slave_1 added [ 62.613920][ T6989] device hsr_slave_0 entered promiscuous mode [ 62.653330][ T6989] device hsr_slave_1 entered promiscuous mode [ 62.705132][ T6989] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.712275][ T6989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.719549][ T6989] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.727534][ T6989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.741087][ T6989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.749362][ T3042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.757092][ T3042] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.764617][ T3042] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.771894][ T3042] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 62.780757][ T6989] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.789118][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.798388][ T2959] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.806544][ T2959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.818246][ T6989] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 62.828789][ T6989] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.839847][ T6991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.848329][ T6991] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.855369][ T6991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.862821][ T6991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.870861][ T6991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.878936][ T6991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.886867][ T6991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.894923][ T6991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready executing program [ 62.902157][ T6991] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.911555][ T6989] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program [ 69.142035][ T6989] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811a07d680 (size 768): comm "syz-executor390", pid 6998, jiffies 4294943562 (age 13.350s) hex dump (first 32 bytes): 03 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000003a31cc82>] kmem_cache_alloc+0x13f/0x2c0 [<0000000023393038>] sock_alloc_inode+0x1c/0xa0 [<00000000537b1cab>] alloc_inode+0x2c/0xe0 [<00000000bf5438eb>] new_inode_pseudo+0x18/0x70 [<000000007b888f67>] sock_alloc+0x1c/0x90 [<00000000a7702a39>] __sock_create+0x8f/0x250 [<00000000b6f6a1bf>] sock_create_kern+0x3b/0x50 [<00000000989f9ac3>] smc_create+0xae/0x160 [<000000007ba3f710>] __sock_create+0x164/0x250 [<00000000b31b4cad>] __sys_socket+0x69/0x110 [<00000000759a22b1>] __x64_sys_socket+0x1e/0x30 [<0000000087846307>] do_syscall_64+0x73/0x1f0 [<00000000b4c73204>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881215f41c0 (size 56): comm "syz-executor390", pid 6998, jiffies 4294943562 (age 13.350s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 d7 07 1a 81 88 ff ff d8 41 5f 21 81 88 ff ff .........A_!.... backtrace: [<000000003a31cc82>] kmem_cache_alloc+0x13f/0x2c0 [<00000000bd7159df>] security_inode_alloc+0x33/0xb0 [<00000000298d70da>] inode_init_always+0x108/0x200 [<00000000d82cb8cc>] alloc_inode+0x49/0xe0 [<00000000bf5438eb>] new_inode_pseudo+0x18/0x70 [<000000007b888f67>] sock_alloc+0x1c/0x90 [<00000000a7702a39>] __sock_create+0x8f/0x250 [<00000000b6f6a1bf>] sock_create_kern+0x3b/0x50 [<00000000989f9ac3>] smc_create+0xae/0x160 [<000000007ba3f710>] __sock_create+0x164/0x250 [<00000000b31b4cad>] __sys_socket+0x69/0x110 [<00000000759a22b1>] __x64_sys_socket+0x1e/0x30 [<0000000087846307>] do_syscall_64+0x73/0x1f0 [<00000000b4c73204>] entry_SYSCALL_64_after_hwframe+0x44/0xa9