[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 25.460926][ T24] kauditd_printk_skb: 16 callbacks suppressed [ 25.460931][ T24] audit: type=1800 audit(1560111719.603:33): pid=6870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 25.491441][ T24] audit: type=1800 audit(1560111719.613:34): pid=6870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: rsyslog restorecond ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.688139][ T24] audit: type=1400 audit(1560111726.833:35): avc: denied { map } for pid=7068 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.204' (ECDSA) to the list of known hosts. [ 38.741176][ T24] audit: type=1400 audit(1560111732.883:36): avc: denied { map } for pid=7082 comm="syz-executor774" path="/root/syz-executor774164605" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 45.573952][ T7083] IPVS: ftp: loaded support on port[0] = 21 [ 45.588590][ T24] audit: type=1400 audit(1560111739.733:37): avc: denied { map } for pid=7083 comm="syz-executor774" path="/dev/binder0" dev="devtmpfs" ino=18206 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 45.588959][ T7083] binder: 7083:7083 ioctl c0306201 20000440 returned -14 [ 45.614484][ T24] audit: type=1400 audit(1560111739.733:38): avc: denied { set_context_mgr } for pid=7083 comm="syz-executor774" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 45.614495][ T24] audit: type=1400 audit(1560111739.733:39): avc: denied { call } for pid=7083 comm="syz-executor774" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 51.588262][ T7082] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888123934800 (size 32): comm "syz-executor774", pid 7083, jiffies 4294941834 (age 7.970s) hex dump (first 32 bytes): 00 48 93 23 81 88 ff ff 00 48 93 23 81 88 ff ff .H.#.....H.#.... 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000038ba7202>] kmem_cache_alloc_trace+0x13d/0x280 [<0000000004e63839>] binder_transaction+0x28b/0x2eb0 [<0000000050997ec4>] binder_thread_write+0x357/0x1430 [<00000000ab2de227>] binder_ioctl+0x8bc/0xbb4 [<000000002eec2b63>] do_vfs_ioctl+0x62a/0x810 [<0000000048cfc9e6>] ksys_ioctl+0x86/0xb0 [<0000000030bf392d>] __x64_sys_ioctl+0x1e/0x30 [<000000007dec438c>] do_syscall_64+0x76/0x1a0 [<00000000ae043c96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9