[....] Starting enhanced syslogd: rsyslogd[   14.302722] audit: type=1400 audit(1516723178.764:5): avc:  denied  { syslog } for  pid=3503 comm="rsyslogd" capability=34  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
Starting mcstransd: 
[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   16.991166] audit: type=1400 audit(1516723181.452:6): avc:  denied  { map } for  pid=3642 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.0.16' (ECDSA) to the list of known hosts.
executing program
[   23.285753] audit: type=1400 audit(1516723187.747:7): avc:  denied  { map } for  pid=3656 comm="syzkaller703595" path="/root/syzkaller703595530" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
[   23.320599] audit: type=1400 audit(1516723187.782:8): avc:  denied  { map_create } for  pid=3657 comm="syzkaller703595" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1
[   23.321306] 
[   23.321309] =============================
[   23.321311] WARNING: suspicious RCU usage
[   23.321317] 4.15.0-rc8+ #1 Not tainted
[   23.321319] -----------------------------
[   23.321324] ./include/linux/rcupdate.h:302 Illegal context switch in RCU read-side critical section!
[   23.321326] 
[   23.321326] other info that might help us debug this:
[   23.321326] 
[   23.321329] 
[   23.321329] rcu_scheduler_active = 2, debug_locks = 1
[   23.321334] 1 lock held by syzkaller703595/3657:
[   23.321336]  #0:  (rcu_read_lock){....}, at: [<000000009f49ecac>] SyS_bpf+0x1105/0x4860
[   23.321359] 
[   23.321359] stack backtrace:
[   23.321366] CPU: 1 PID: 3657 Comm: syzkaller703595 Not tainted 4.15.0-rc8+ #1
[   23.321370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   23.321373] Call Trace:
[   23.321384]  dump_stack+0x194/0x257
[   23.321398]  ? arch_local_irq_restore+0x53/0x53
[   23.321425]  lockdep_rcu_suspicious+0x123/0x170
[   23.321440]  ___might_sleep+0x385/0x470
[   23.321449]  ? trace_event_raw_event_sched_switch+0x800/0x800
[   23.321459]  ? _raw_spin_unlock_irqrestore+0x31/0xba
[   23.321471]  ? trace_hardirqs_on_caller+0x421/0x5c0
[   23.321485]  __might_sleep+0x95/0x190
[   23.321501]  __kmalloc+0x2c5/0x760
[   23.321519]  ? trie_get_next_key+0x517/0xf10
[   23.321536]  trie_get_next_key+0x517/0xf10
[   23.321564]  ? trie_lookup_elem+0x7d0/0x7d0
[   23.321598]  ? lock_acquire+0x1d5/0x580
[   23.321605]  ? lock_acquire+0x1d5/0x580
[   23.321612]  ? SyS_bpf+0x1105/0x4860
[   23.321630]  ? lock_release+0xa40/0xa40
[   23.321640]  ? rcu_read_lock_sched_held+0x108/0x120
[   23.321648]  ? __kmalloc+0x46e/0x760
[   23.321658]  ? rcutorture_record_progress+0x10/0x10
[   23.321668]  ? SyS_bpf+0x10bd/0x4860
[   23.321683]  SyS_bpf+0x11b4/0x4860
[   23.321701]  ? bpf_prog_get+0x20/0x20
[   23.321714]  ? lock_release+0xa40/0xa40
[   23.321731]  ? do_raw_spin_trylock+0x190/0x190
[   23.321756]  ? _raw_spin_unlock+0x22/0x30
[   23.321766]  ? __handle_mm_fault+0x80e/0x3ce0
[   23.321781]  ? check_noncircular+0x20/0x