[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [[ 23.224499][ T23] kauditd_printk_skb: 16 callbacks suppressed ....] Starting O[ 23.224507][ T23] audit: type=1800 audit(1563710116.233:33): pid=6787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 penBSD Secure Sh[ 23.254707][ T23] audit: type=1800 audit(1563710116.233:34): pid=6787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 ell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 23.707871][ T23] audit: type=1400 audit(1563710116.713:35): avc: denied { map } for pid=6962 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.111' (ECDSA) to the list of known hosts. syzkaller login: [ 29.722213][ T23] audit: type=1400 audit(1563710122.733:36): avc: denied { map } for pid=6976 comm="syz-executor647" path="/root/syz-executor647201779" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 36.445009][ T6976] FAULT_INJECTION: forcing a failure. [ 36.445009][ T6976] name failslab, interval 1, probability 0, space 0, times 1 [ 36.457741][ T6976] CPU: 1 PID: 6976 Comm: syz-executor647 Not tainted 5.2.0+ #73 [ 36.465347][ T6976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.475414][ T6976] Call Trace: [ 36.478829][ T6976] dump_stack+0xaa/0xd6 [ 36.482957][ T6976] should_fail.cold+0x3c/0x49 [ 36.487600][ T6976] __should_failslab+0x65/0xa0 [ 36.492332][ T6976] ? cls_destroy+0x110/0x110 [ 36.496884][ T6976] should_failslab+0x9/0x14 [ 36.501354][ T6976] kmem_cache_alloc_trace+0x2d/0x280 [ 36.506603][ T6976] ? cls_destroy+0x110/0x110 [ 36.511216][ T6976] ? avtab_read.cold+0x71/0x71 [ 36.515955][ T6976] hashtab_create+0x2e/0xd0 [ 36.520488][ T6976] policydb_read+0x20a/0x1b80 [ 36.525203][ T6976] ? stack_trace_save+0x5a/0x80 [ 36.530030][ T6976] ? create_object+0x20c/0x280 [ 36.535100][ T6976] ? kmemleak_alloc+0x23/0x40 [ 36.539742][ T6976] ? kmem_cache_alloc_trace+0x145/0x280 [ 36.545251][ T6976] security_load_policy+0x182/0x740 [ 36.550478][ T6976] ? check_stack_object+0xb7/0xf0 [ 36.555475][ T6976] ? __check_object_size+0x33/0x21a [ 36.560641][ T6976] sel_write_load+0x101/0x1f0 [ 36.565335][ T6976] ? sel_make_policy_nodes+0x850/0x850 [ 36.575671][ T6976] __vfs_write+0x43/0xa0 [ 36.579881][ T6976] ? rw_verify_area+0x86/0x130 [ 36.584683][ T6976] vfs_write+0xee/0x210 [ 36.588870][ T6976] ksys_write+0x7c/0x130 [ 36.593084][ T6976] __x64_sys_write+0x1e/0x30 [ 36.597709][ T6976] do_syscall_64+0x76/0x1a0 [ 36.602188][ T6976] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 36.608049][ T6976] RIP: 0033:0x440929 [ 36.612037][ T6976] Code: 27 02 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 ab 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 36.631679][ T6976] RSP: 002b:00007ffc57eb3788 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 36.640121][ T6976] RAX: ffffffffffffffda RBX: 00007ffc57eb3790 RCX: 0000000000440929 [ 36.648072][ T6976] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000003 [ 36.656053][ T6976] RBP: 0000000000000004 R08: 0000000000000002 R09: 00007ffc57003832 [ 36.663999][ T6976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000402160 [ 36.671942][ T6976] R13: 00000000004021f0 R14: 0000000000000000 R15: 0000000000000000 [ 36.680132][ T6976] SELinux: failed to load policy [ 42.385080][ T6976] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888123547c80 (size 64): comm "syz-executor647", pid 6976, jiffies 4294940919 (age 7.920s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000019b1b22a>] kmem_cache_alloc_trace+0x145/0x280 [<00000000d64c33c7>] policydb_read+0x141/0x1b80 [<000000004dd18ef6>] security_load_policy+0x182/0x740 [<000000004f5bb277>] sel_write_load+0x101/0x1f0 [<00000000ee05c840>] __vfs_write+0x43/0xa0 [<000000008ca23315>] vfs_write+0xee/0x210 [<00000000d97bcbc9>] ksys_write+0x7c/0x130 [<000000007a3f006b>] __x64_sys_write+0x1e/0x30 [<000000001c16ef20>] do_syscall_64+0x76/0x1a0 [<000000007784189d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9