[ 24.586509][ T25] audit: type=1400 audit(1573153929.389:37): avc: denied { watch } for pid=6855 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 24.612990][ T25] audit: type=1400 audit(1573153929.389:38): avc: denied { watch } for pid=6855 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 24.929069][ T25] audit: type=1800 audit(1573153929.729:39): pid=6772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 24.954355][ T25] audit: type=1800 audit(1573153929.729:40): pid=6772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.117863][ T25] audit: type=1400 audit(1573153932.919:41): avc: denied { map } for pid=6949 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.36' (ECDSA) to the list of known hosts. [ 34.904911][ T25] audit: type=1400 audit(1573153939.709:42): avc: denied { map } for pid=6963 comm="syz-executor807" path="/root/syz-executor807913597" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 41.661693][ T6966] IPVS: ftp: loaded support on port[0] = 21 [ 41.673445][ T25] audit: type=1400 audit(1573153946.479:43): avc: denied { create } for pid=6966 comm="syz-executor807" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 41.698577][ T25] audit: type=1400 audit(1573153946.479:44): avc: denied { write } for pid=6966 comm="syz-executor807" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 41.723174][ T25] audit: type=1400 audit(1573153946.479:45): avc: denied { read } for pid=6966 comm="syz-executor807" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 47.568001][ T6963] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888116065640 (size 1376): comm "syz-executor807", pid 6966, jiffies 4294941436 (age 7.890s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............ backtrace: [<00000000a2c3036f>] kmem_cache_alloc+0x13f/0x2c0 [<0000000017fb19c9>] sk_prot_alloc+0x41/0x170 [<000000003f4f8b29>] sk_alloc+0x35/0x2f0 [<00000000ec501a36>] smc_sock_alloc+0x4a/0x1a0 [<0000000051492f9e>] smc_create+0x6b/0x160 [<000000000c021e3c>] __sock_create+0x164/0x250 [<00000000a8cc0948>] __sys_socket+0x69/0x110 [<0000000089e5ee29>] __x64_sys_socket+0x1e/0x30 [<0000000054d26d77>] do_syscall_64+0x73/0x1f0 [<00000000f4ae1e35>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881165b9e00 (size 32): comm "syz-executor807", pid 6966, jiffies 4294941436 (age 7.890s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e1 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<000000007e630cd8>] kmem_cache_alloc_trace+0x145/0x2c0 [<0000000021f9870b>] selinux_sk_alloc_security+0x48/0xb0 [<0000000067535527>] security_sk_alloc+0x49/0x70 [<000000002db4ae04>] sk_prot_alloc+0xa1/0x170 [<000000003f4f8b29>] sk_alloc+0x35/0x2f0 [<00000000ec501a36>] smc_sock_alloc+0x4a/0x1a0 [<0000000051492f9e>] smc_create+0x6b/0x160 [<000000000c021e3c>] __sock_create+0x164/0x250 [<00000000a8cc0948>] __sys_socket+0x69/0x110 [<0000000089e5ee29>] __x64_sys_socket+0x1e/0x30 [<0000000054d26d77>] do_syscall_64+0x73/0x1f0 [<00000000f4ae1e35>] entry_SYSCALL_64_after_hwframe+0x44/0xa9