[ 25.362532][ T26] audit: type=1400 audit(1576782490.479:37): avc: denied { watch } for pid=7027 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16180 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 25.387699][ T26] audit: type=1400 audit(1576782490.479:38): avc: denied { watch } for pid=7027 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 25.489060][ T26] audit: type=1800 audit(1576782490.609:39): pid=6932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 25.512563][ T26] audit: type=1800 audit(1576782490.609:40): pid=6932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.745027][ T26] audit: type=1400 audit(1576782494.859:41): avc: denied { map } for pid=7114 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.6' (ECDSA) to the list of known hosts. [ 64.696207][ T26] audit: type=1400 audit(1576782529.809:42): avc: denied { map } for pid=7129 comm="syz-executor676" path="/root/syz-executor676832323" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 65.566174][ T7129] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) executing program [ 71.966112][ T7130] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 executing program [ 77.843708][ T7137] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 executing program [ 83.761207][ T7144] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 executing program [ 89.657718][ T7151] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 90.569713][ T7129] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 95.445838][ T7129] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811823c900 (size 32): comm "syz-executor676", pid 7130, jiffies 4294944463 (age 25.470s) hex dump (first 32 bytes): 2e 00 75 6e 2f 75 64 65 76 2f 77 61 74 63 68 2f ..un/udev/watch/ 33 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 32.............. backtrace: [<00000000570b63f2>] __kmalloc_track_caller+0x165/0x300 [<00000000954ea523>] kstrdup+0x3a/0x70 [<0000000034b540ab>] reiserfs_fill_super+0x500/0x1120 [<00000000f8741321>] mount_bdev+0x1ce/0x210 [<0000000053eb97d6>] get_super_block+0x35/0x40 [<000000004112ac3e>] legacy_get_tree+0x27/0x80 [<000000006d9b9ca0>] vfs_get_tree+0x2d/0xe0 [<00000000c9c9c0e8>] do_mount+0x97c/0xc80 [<0000000098eb1b25>] __x64_sys_mount+0xc0/0x140 [<00000000bc35572b>] do_syscall_64+0x73/0x220 [<00000000df3745e7>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119e8caa0 (size 32): comm "syz-executor676", pid 7144, jiffies 4294945643 (age 13.670s) hex dump (first 32 bytes): 2e 00 63 75 72 69 74 79 2e 73 65 6c 69 6e 75 78 ..curity.selinux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000570b63f2>] __kmalloc_track_caller+0x165/0x300 [<00000000954ea523>] kstrdup+0x3a/0x70 [<0000000034b540ab>] reiserfs_fill_super+0x500/0x1120 [<00000000f8741321>] mount_bdev+0x1ce/0x210 [<0000000053eb97d6>] get_super_block+0x35/0x40 [<000000004112ac3e>] legacy_get_tree+0x27/0x80 [<000000006d9b9ca0>] vfs_get_tree+0x2d/0xe0 [<00000000c9c9c0e8>] do_mount+0x97c/0xc80 [<0000000098eb1b25>] __x64_sys_mount+0xc0/0x140 [<00000000bc35572b>] do_syscall_64+0x73/0x220 [<00000000df3745e7>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811cebf820 (size 32): comm "syz-executor676", pid 7151, jiffies 4294946232 (age 7.780s) hex dump (first 32 bytes): 2e 00 65 76 2f 6c 6f 6f 70 30 00 00 00 00 00 00 ..ev/loop0...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000570b63f2>] __kmalloc_track_caller+0x165/0x300 [<00000000954ea523>] kstrdup+0x3a/0x70 [<0000000034b540ab>] reiserfs_fill_super+0x500/0x1120 [<00000000f8741321>] mount_bdev+0x1ce/0x210 [<0000000053eb97d6>] get_super_block+0x35/0x40 [<000000004112ac3e>] legacy_get_tree+0x27/0x80 [<000000006d9b9ca0>] vfs_get_tree+0x2d/0xe0 [<00000000c9c9c0e8>] do_mount+0x97c/0xc80 [<0000000098eb1b25>] __x64_sys_mount+0xc0/0x140 [<00000000bc35572b>] do_syscall_64+0x73/0x220 [<00000000df3745e7>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 97.370338][ T7129] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)