[....] Starting file context maintaining daemon: restorecond[   23.904830][   T25] kauditd_printk_skb: 16 callbacks suppressed
[   23.904836][   T25] audit: type=1400 audit(1576451491.659:37): avc:  denied  { watch } for  pid=6931 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1
[?25l[?1c7[1[   23.937522][   T25] audit: type=1400 audit(1576451491.659:38): avc:  denied  { watch } for  pid=6931 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
G[ ok 8[?25h[?0c[   23.967066][   T25] audit: type=1800 audit(1576451491.719:39): pid=6841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0
.
[   23.989459][   T25] audit: type=1800 audit(1576451491.719:40): pid=6841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   28.544398][   T25] audit: type=1400 audit(1576451496.299:41): avc:  denied  { map } for  pid=7015 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.0.34' (ECDSA) to the list of known hosts.
[   48.606092][   T25] audit: type=1400 audit(1576451516.359:42): avc:  denied  { map } for  pid=7031 comm="syz-executor427" path="/root/syz-executor427044582" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
executing program
[   55.386760][ T7032] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0
executing program
[   61.492498][ T7039] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0
[   67.333448][ T7031] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[   69.447497][ T7031] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff88811f1b45a0 (size 32):
  comm "syz-executor427", pid 7032, jiffies 4294942804 (age 14.120s)
  hex dump (first 32 bytes):
    2e 2f 66 69 6c 65 31 22 00 00 00 00 00 00 00 00  ./file1"........
    03 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000000a0f1adf>] __kmalloc_track_caller+0x165/0x300
    [<00000000edcff24a>] kstrdup+0x3a/0x70
    [<00000000c873434d>] reiserfs_fill_super+0x500/0x1120
    [<00000000c713a97a>] mount_bdev+0x1ce/0x210
    [<000000005dc1cc65>] get_super_block+0x35/0x40
    [<000000007fc6b7d4>] legacy_get_tree+0x27/0x80
    [<00000000a7d63100>] vfs_get_tree+0x2d/0xe0
    [<000000009c590632>] do_mount+0x97c/0xc80
    [<00000000857ac526>] ksys_mount+0xab/0x120
    [<00000000275e3c8e>] __x64_sys_mount+0x26/0x30
    [<000000007c5c9cdf>] do_syscall_64+0x73/0x220
    [<000000007e382e49>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811deca6c0 (size 32):
  comm "syz-executor427", pid 7039, jiffies 4294943415 (age 8.010s)
  hex dump (first 32 bytes):
    2e 2f 66 69 6c 65 31 22 00 73 65 6c 69 6e 75 78  ./file1".selinux
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000000a0f1adf>] __kmalloc_track_caller+0x165/0x300
    [<00000000edcff24a>] kstrdup+0x3a/0x70
    [<00000000c873434d>] reiserfs_fill_super+0x500/0x1120
    [<00000000c713a97a>] mount_bdev+0x1ce/0x210
    [<000000005dc1cc65>] get_super_block+0x35/0x40
    [<000000007fc6b7d4>] legacy_get_tree+0x27/0x80
    [<00000000a7d63100>] vfs_get_tree+0x2d/0xe0
    [<000000009c590632>] do_mount+0x97c/0xc80
    [<00000000857ac526>] ksys_mount+0xab/0x120
    [<00000000275e3c8e>] __x64_sys_mount+0x26/0x30
    [<000000007c5c9cdf>] do_syscall_64+0x73/0x220
    [<000000007e382e49>] entry_SYSCALL_64_after_hwframe+0x44/0xa9