[ 26.435862][ T26] audit: type=1400 audit(1580392630.335:37): avc: denied { watch } for pid=7035 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 26.467761][ T26] audit: type=1400 audit(1580392630.335:38): avc: denied { watch } for pid=7035 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 26.665089][ T26] audit: type=1800 audit(1580392630.565:39): pid=6941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 26.688095][ T26] audit: type=1800 audit(1580392630.565:40): pid=6941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.188796][ T26] audit: type=1400 audit(1580392636.085:41): avc: denied { map } for pid=7116 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.204' (ECDSA) to the list of known hosts. [ 66.989376][ T26] audit: type=1400 audit(1580392670.885:42): avc: denied { map } for pid=7130 comm="syz-executor963" path="/root/syz-executor963199302" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 67.018469][ T26] audit: type=1400 audit(1580392670.885:43): avc: denied { integrity } for pid=7130 comm="syz-executor963" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 executing program [ 73.860452][ T7131] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 executing program [ 79.762178][ T7138] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 80.686317][ T7130] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888117a58b20 (size 32): comm "syz-executor963", pid 7131, jiffies 4294944656 (age 13.730s) hex dump (first 32 bytes): 2e 00 63 75 72 69 74 79 2e 73 65 6c 69 6e 75 78 ..curity.selinux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000002c0b7c1a>] __kmalloc_track_caller+0x165/0x300 [<0000000002d55657>] kstrdup+0x3a/0x70 [<00000000271def13>] reiserfs_fill_super+0x500/0x1120 [<000000000062cb69>] mount_bdev+0x1ce/0x210 [<00000000fea02e5e>] get_super_block+0x35/0x40 [<00000000d6fdb57e>] legacy_get_tree+0x27/0x80 [<000000007acefa69>] vfs_get_tree+0x2d/0xe0 [<0000000087269e72>] do_mount+0x97c/0xc80 [<0000000075fa15ae>] __x64_sys_mount+0xc0/0x140 [<000000007f4273c0>] do_syscall_64+0x73/0x220 [<00000000d5c3ac94>] entry_SYSCALL_64_after_hwframe+0x44/0xa9