[   30.412256][   T26] audit: type=1800 audit(1576851027.495:36): pid=7121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
Starting mcstransd: 
[   30.924651][   T26] audit: type=1400 audit(1576851028.075:37): avc:  denied  { watch } for  pid=7224 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1
[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.217' (ECDSA) to the list of known hosts.
syzkaller login: [   40.505895][   T26] kauditd_printk_skb: 4 callbacks suppressed
[   40.505903][   T26] audit: type=1400 audit(1576851037.665:42): avc:  denied  { map } for  pid=7313 comm="syz-executor259" path="/root/syz-executor259957416" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
executing program
[   47.237963][ T7314] IPVS: ftp: loaded support on port[0] = 21
[   47.249553][   T26] audit: type=1400 audit(1576851044.405:43): avc:  denied  { create } for  pid=7314 comm="syz-executor259" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   47.266575][ T7314] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0
[   47.281430][   T26] audit: type=1400 audit(1576851044.405:44): avc:  denied  { write } for  pid=7314 comm="syz-executor259" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   47.309301][   T26] audit: type=1400 audit(1576851044.405:45): avc:  denied  { read } for  pid=7314 comm="syz-executor259" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   48.165473][ T1044] tipc: TX() has been purged, node left!
[   53.167467][ T7313] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff88810df2d740 (size 32):
  comm "syz-executor259", pid 7314, jiffies 4294941990 (age 7.890s)
  hex dump (first 32 bytes):
    2e 2f 66 69 6c 65 30 02 00 2d 6c 69 6e 75 78 2d  ./file0..-linux-
    78 38 36 2d 36 34 2e 73 6f 2e 32 00 00 00 00 00  x86-64.so.2.....
  backtrace:
    [<00000000014f0c0a>] __kmalloc_track_caller+0x165/0x300
    [<00000000d81f8bc5>] kstrdup+0x3a/0x70
    [<00000000c61892c5>] reiserfs_fill_super+0x500/0x1120
    [<00000000c12110b1>] mount_bdev+0x1ce/0x210
    [<000000004256d3e9>] get_super_block+0x35/0x40
    [<00000000974d4803>] legacy_get_tree+0x27/0x80
    [<0000000013eff38c>] vfs_get_tree+0x2d/0xe0
    [<000000009b6fd4c9>] do_mount+0x97c/0xc80
    [<000000008273699e>] __x64_sys_mount+0xc0/0x140
    [<00000000ae8f9367>] do_syscall_64+0x73/0x220
    [<00000000e47310a5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9