[ 24.426409][ T26] audit: type=1800 audit(1584229493.385:40): pid=6869 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.328572][ T26] audit: type=1400 audit(1584229498.315:41): avc: denied { map } for pid=7040 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.141' (ECDSA) to the list of known hosts. [ 35.408907][ T26] audit: type=1400 audit(1584229504.395:42): avc: denied { map } for pid=7054 comm="syz-executor637" path="/root/syz-executor637343848" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 35.435870][ T26] audit: type=1400 audit(1584229504.395:43): avc: denied { integrity } for pid=7054 comm="syz-executor637" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program [ 42.177278][ T7056] IPVS: ftp: loaded support on port[0] = 21 executing program executing program [ 60.285879][ T7056] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811ddc4c00 (size 512): comm "syz-executor637", pid 7060, jiffies 4294942097 (age 14.030s) hex dump (first 32 bytes): 57 aa 49 b5 ff 01 14 13 4c 18 53 c4 a6 1c ec 1a W.I.....L.S..... 63 60 48 45 22 10 7d 6f e3 d9 53 45 7b b8 b7 52 c`HE".}o..SE{..R backtrace: [<00000000266c47d4>] kmemdup_nul+0x2d/0x70 [<00000000f770ca6a>] v9fs_session_init+0x29e/0x880 [<00000000dc37f997>] v9fs_mount+0x56/0x390 [<00000000b87845cb>] legacy_get_tree+0x23/0x70 [<00000000c29bc74e>] vfs_get_tree+0x28/0xe0 [<00000000371ebd0c>] do_mount+0x958/0xc50 [<0000000017e6169e>] __x64_sys_mount+0xb0/0x120 [<00000000bd76a9c7>] do_syscall_64+0x6e/0x220 [<00000000ebc5e6e9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888121f3c400 (size 512): comm "syz-executor637", pid 7062, jiffies 4294942704 (age 7.960s) hex dump (first 32 bytes): 57 aa 49 b5 ff 01 14 13 4c 18 53 c4 a6 1c ec 1a W.I.....L.S..... 63 60 48 45 22 10 7d 6f e3 d9 53 45 7b b8 b7 52 c`HE".}o..SE{..R backtrace: [<00000000266c47d4>] kmemdup_nul+0x2d/0x70 [<00000000f770ca6a>] v9fs_session_init+0x29e/0x880 [<00000000dc37f997>] v9fs_mount+0x56/0x390 [<00000000b87845cb>] legacy_get_tree+0x23/0x70 [<00000000c29bc74e>] vfs_get_tree+0x28/0xe0 [<00000000371ebd0c>] do_mount+0x958/0xc50 [<0000000017e6169e>] __x64_sys_mount+0xb0/0x120 [<00000000bd76a9c7>] do_syscall_64+0x6e/0x220 [<00000000ebc5e6e9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9