[ 28.160840][ T25] audit: type=1400 audit(1583217577.733:37): avc: denied { watch } for pid=7150 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [....] Starting [ 28.191472][ T25] audit: type=1400 audit(1583217577.733:38): avc: denied { watch } for pid=7150 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context[ 28.225715][ T25] audit: type=1800 audit(1583217577.803:39): pid=7062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 maintaining dae[ 28.247614][ T25] audit: type=1800 audit(1583217577.803:40): pid=7062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 mon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.596538][ T25] audit: type=1400 audit(1583217582.173:41): avc: denied { map } for pid=7242 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.133' (ECDSA) to the list of known hosts. [ 48.483236][ T25] audit: type=1400 audit(1583217598.053:42): avc: denied { map } for pid=7256 comm="syz-executor392" path="/root/syz-executor392324169" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 48.510272][ T25] audit: type=1400 audit(1583217598.053:43): avc: denied { integrity } for pid=7256 comm="syz-executor392" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program executing program executing program executing program executing program [ 79.479689][ T7256] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 86.295835][ T7256] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811f74f800 (size 512): comm "syz-executor392", pid 7260, jiffies 4294944547 (age 13.580s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 f8 74 1f 81 88 ff ff ..........t..... 08 f8 74 1f 81 88 ff ff 18 f8 74 1f 81 88 ff ff ..t.......t..... backtrace: [<000000004cb1f79e>] __kmalloc+0x169/0x300 [<00000000ea1cc1e2>] rds_message_alloc+0x3e/0xc0 [<00000000d06495bc>] rds_send_probe.constprop.0+0x42/0x380 [<000000009bcbc6f2>] rds_send_pong+0x1e/0x23 [<00000000a48abc49>] rds_recv_incoming+0x496/0x5e0 [<00000000b6b39225>] rds_loop_xmit+0x86/0x100 [<000000003ccc4389>] rds_send_xmit+0x5a9/0xb40 [<00000000e83e6e22>] rds_sendmsg+0x13fa/0x16d0 [<0000000000e93fb3>] sock_sendmsg+0x54/0x70 [<00000000b445912d>] __sys_sendto+0x148/0x1f0 [<00000000e310bcd9>] __x64_sys_sendto+0x2a/0x30 [<000000005c79d915>] do_syscall_64+0x73/0x220 [<00000000dfa2d15a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811f73fe00 (size 512): comm "syz-executor392", pid 7261, jiffies 4294945131 (age 7.740s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 fe 73 1f 81 88 ff ff ..........s..... 08 fe 73 1f 81 88 ff ff 18 fe 73 1f 81 88 ff ff ..s.......s..... backtrace: [<000000004cb1f79e>] __kmalloc+0x169/0x300 [<00000000ea1cc1e2>] rds_message_alloc+0x3e/0xc0 [<00000000d06495bc>] rds_send_probe.constprop.0+0x42/0x380 [<000000009bcbc6f2>] rds_send_pong+0x1e/0x23 [<00000000a48abc49>] rds_recv_incoming+0x496/0x5e0 [<00000000b6b39225>] rds_loop_xmit+0x86/0x100 [<000000003ccc4389>] rds_send_xmit+0x5a9/0xb40 [<00000000e83e6e22>] rds_sendmsg+0x13fa/0x16d0 [<0000000000e93fb3>] sock_sendmsg+0x54/0x70 [<00000000b445912d>] __sys_sendto+0x148/0x1f0 [<00000000e310bcd9>] __x64_sys_sendto+0x2a/0x30 [<000000005c79d915>] do_syscall_64+0x73/0x220 [<00000000dfa2d15a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9