[   28.919179][   T25] audit: type=1800 audit(1580839578.345:34): pid=7170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
Starting mcstransd: 
[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   33.928447][   T25] kauditd_printk_skb: 6 callbacks suppressed
[   33.928455][   T25] audit: type=1400 audit(1580839583.375:41): avc:  denied  { map } for  pid=7349 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.0.63' (ECDSA) to the list of known hosts.
[   42.262782][   T25] audit: type=1400 audit(1580839591.715:42): avc:  denied  { map } for  pid=7363 comm="syz-executor588" path="/root/syz-executor588471401" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
[   42.290459][   T25] audit: type=1400 audit(1580839591.715:43): avc:  denied  { integrity } for  pid=7363 comm="syz-executor588" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1
executing program
[   49.214842][   T25] audit: type=1400 audit(1580839598.665:44): avc:  denied  { create } for  pid=7364 comm="syz-executor588" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[   49.240036][   T25] audit: type=1400 audit(1580839598.665:45): avc:  denied  { write } for  pid=7364 comm="syz-executor588" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
executing program
[   61.302199][ T7363] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff888114688700 (size 96):
  comm "syz-executor588", pid 7364, jiffies 4294942189 (age 14.190s)
  hex dump (first 32 bytes):
    40 9c 1c 18 81 88 ff ff 40 9c 1c 18 81 88 ff ff  @.......@.......
    10 a2 c6 82 ff ff ff ff 00 10 22 25 81 88 ff ff  .........."%....
  backtrace:
    [<000000006364bc3b>] kmem_cache_alloc_trace+0x145/0x2c0
    [<000000005646d31e>] nft_netdev_hook_alloc+0x3f/0xd0
    [<0000000090f541f7>] nf_tables_parse_netdev_hooks+0xaa/0x220
    [<00000000d03bdc11>] nf_tables_newflowtable+0x407/0x930
    [<000000001278b550>] nfnetlink_rcv_batch+0x353/0x8c0
    [<00000000c4090c05>] nfnetlink_rcv+0x189/0x1c0
    [<000000002d769b7c>] netlink_unicast+0x223/0x310
    [<000000000cbca47f>] netlink_sendmsg+0x2c0/0x570
    [<0000000019ca4fce>] sock_sendmsg+0x54/0x70
    [<000000005f5c3097>] ____sys_sendmsg+0x2d0/0x300
    [<000000003b708fee>] ___sys_sendmsg+0x8a/0xd0
    [<000000003682f43a>] __sys_sendmsg+0x80/0xf0
    [<00000000983edd44>] __x64_sys_sendmsg+0x23/0x30
    [<00000000a2bed369>] do_syscall_64+0x73/0x220
    [<00000000b998947a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9