[ 25.288669][ T26] audit: type=1400 audit(1575758785.630:38): avc: denied { watch } for pid=6978 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 25.359208][ T26] audit: type=1800 audit(1575758785.720:39): pid=6892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 25.380808][ T26] audit: type=1800 audit(1575758785.730:40): pid=6892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 26.452159][ T26] audit: type=1400 audit(1575758786.820:41): avc: denied { map } for pid=7062 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.107' (ECDSA) to the list of known hosts. syzkaller login: [ 69.495590][ T26] audit: type=1400 audit(1575758829.860:42): avc: denied { map } for pid=7078 comm="syz-executor987" path="/root/syz-executor987228515" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program [ 83.143795][ T7088] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881188db8c0 (size 64): comm "syz-executor987", pid 7131, jiffies 4294944915 (age 18.170s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ d0 b8 8d 18 81 88 ff ff d0 b8 8d 18 81 88 ff ff ................ backtrace: [<00000000e9e369cb>] kmem_cache_alloc_trace+0x145/0x2c0 [<00000000d25ee7bc>] netdev_name_node_alloc+0x2a/0x70 [<0000000055a0a41b>] register_netdevice+0xaf/0x650 [<00000000c37f8a98>] bond_newlink+0x41/0x80 [<00000000425a41fc>] __rtnl_newlink+0x89a/0xb80 [<0000000023c62818>] rtnl_newlink+0x4e/0x80 [<00000000ef8dddd8>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000001d4f4528>] netlink_rcv_skb+0x61/0x170 [<00000000bf341843>] rtnetlink_rcv+0x1d/0x30 [<00000000bf6d68b1>] netlink_unicast+0x223/0x310 [<00000000ccb699cf>] netlink_sendmsg+0x2c0/0x570 [<000000003c907a71>] sock_sendmsg+0x54/0x70 [<00000000c5a53a80>] ____sys_sendmsg+0x2d0/0x300 [<00000000555e309c>] ___sys_sendmsg+0x8a/0xd0 [<000000001ea9c29c>] __sys_sendmsg+0x80/0xf0 [<000000004c27fd15>] __x64_sys_sendmsg+0x23/0x30 BUG: memory leak unreferenced object 0xffff888120d4f580 (size 64): comm "syz-executor987", pid 7138, jiffies 4294944920 (age 18.120s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 f5 d4 20 81 88 ff ff 90 f5 d4 20 81 88 ff ff ... ....... .... backtrace: [<00000000e9e369cb>] kmem_cache_alloc_trace+0x145/0x2c0 [<00000000d25ee7bc>] netdev_name_node_alloc+0x2a/0x70 [<0000000055a0a41b>] register_netdevice+0xaf/0x650 [<00000000c37f8a98>] bond_newlink+0x41/0x80 [<00000000425a41fc>] __rtnl_newlink+0x89a/0xb80 [<0000000023c62818>] rtnl_newlink+0x4e/0x80 [<00000000ef8dddd8>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000001d4f4528>] netlink_rcv_skb+0x61/0x170 [<00000000bf341843>] rtnetlink_rcv+0x1d/0x30 [<00000000bf6d68b1>] netlink_unicast+0x223/0x310 [<00000000ccb699cf>] netlink_sendmsg+0x2c0/0x570 [<000000003c907a71>] sock_sendmsg+0x54/0x70 [<00000000c5a53a80>] ____sys_sendmsg+0x2d0/0x300 [<00000000555e309c>] ___sys_sendmsg+0x8a/0xd0 [<000000001ea9c29c>] __sys_sendmsg+0x80/0xf0 [<000000004c27fd15>] __x64_sys_sendmsg+0x23/0x30 BUG: memory leak unreferenced object 0xffff8881188db8c0 (size 64): comm "syz-executor987", pid 7131, jiffies 4294944915 (age 19.400s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ d0 b8 8d 18 81 88 ff ff d0 b8 8d 18 81 88 ff ff ................ backtrace: [<00000000e9e369cb>] kmem_cache_alloc_trace+0x145/0x2c0 [<00000000d25ee7bc>] netdev_name_node_alloc+0x2a/0x70 [<0000000055a0a41b>] register_netdevice+0xaf/0x650 [<00000000c37f8a98>] bond_newlink+0x41/0x80 [<00000000425a41fc>] __rtnl_newlink+0x89a/0xb80 [<0000000023c62818>] rtnl_newlink+0x4e/0x80 [<00000000ef8dddd8>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000001d4f4528>] netlink_rcv_skb+0x61/0x170 [<00000000bf341843>] rtnetlink_rcv+0x1d/0x30 [<00000000bf6d68b1>] netlink_unicast+0x223/0x310 [<00000000ccb699cf>] netlink_sendmsg+0x2c0/0x570 [<000000003c907a71>] sock_sendmsg+0x54/0x70 [<00000000c5a53a80>] ____sys_sendmsg+0x2d0/0x300 [<00000000555e309c>] ___sys_sendmsg+0x8a/0xd0 [<000000001ea9c29c>] __sys_sendmsg+0x80/0xf0 [<000000004c27fd15>] __x64_sys_sendmsg+0x23/0x30 BUG: memory leak unreferenced object 0xffff888120d4f580 (size 64): comm "syz-executor987", pid 7138, jiffies 4294944920 (age 19.350s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 90 f5 d4 20 81 88 ff ff 90 f5 d4 20 81 88 ff ff ... ....... .... backtrace: [<00000000e9e369cb>] kmem_cache_alloc_trace+0x145/0x2c0 [<00000000d25ee7bc>] netdev_name_node_alloc+0x2a/0x70 [<0000000055a0a41b>] register_netdevice+0xaf/0x650 [<00000000c37f8a98>] bond_newlink+0x41/0x80 [<00000000425a41fc>] __rtnl_newlink+0x89a/0xb80 [<0000000023c62818>] rtnl_newlink+0x4e/0x80 [<00000000ef8dddd8>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000001d4f4528>] netlink_rcv_skb+0x61/0x170 [<00000000bf341843>] rtnetlink_rcv+0x1d/0x30 [<00000000bf6d68b1>] netlink_unicast+0x223/0x310 [<00000000ccb699cf>] netlink_sendmsg+0x2c0/0x570 [<000000003c907a71>] sock_sendmsg+0x54/0x70 [<00000000c5a53a80>] ____sys_sendmsg+0x2d0/0x300 [<00000000555e309c>] ___sys_sendmsg+0x8a/0xd0 [<000000001ea9c29c>] __sys_sendmsg+0x80/0xf0 [<000000004c27fd15>] __x64_sys_sendmsg+0x23/0x30 executing program executing program executing program executing program