[ 252.781013][ T40] audit: type=1400 audit(1600758340.844:41): avc: denied { map } for pid=10071 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:19958' (ECDSA) to the list of known hosts. 2020/09/22 07:05:44 fuzzer started [ 256.746074][ T40] audit: type=1400 audit(1600758344.814:42): avc: denied { map } for pid=10085 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16526 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2020/09/22 07:05:45 dialing manager at 10.0.2.10:43591 2020/09/22 07:05:46 syscalls: 3367 2020/09/22 07:05:46 code coverage: enabled 2020/09/22 07:05:46 comparison tracing: enabled 2020/09/22 07:05:46 extra coverage: enabled 2020/09/22 07:05:46 setuid sandbox: enabled 2020/09/22 07:05:46 namespace sandbox: enabled 2020/09/22 07:05:46 Android sandbox: /sys/fs/selinux/policy does not exist 2020/09/22 07:05:46 fault injection: enabled 2020/09/22 07:05:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/09/22 07:05:46 net packet injection: enabled 2020/09/22 07:05:46 net device setup: enabled 2020/09/22 07:05:46 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/09/22 07:05:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/09/22 07:05:46 USB emulation: enabled 2020/09/22 07:05:46 hci packet injection: enabled [ 257.939208][ T40] audit: type=1400 audit(1600758346.004:43): avc: denied { integrity } for pid=10102 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 266.709262][ C1] WARNING: can't access registers at asm_common_interrupt+0x1e/0x40