[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.488380][ T22] kauditd_printk_skb: 20 callbacks suppressed [ 28.488387][ T22] audit: type=1400 audit(1570794005.088:41): avc: denied { map } for pid=6844 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.160' (ECDSA) to the list of known hosts. [ 34.356773][ T22] audit: type=1400 audit(1570794010.958:42): avc: denied { map } for pid=6858 comm="syz-executor998" path="/root/syz-executor998623717" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 41.128145][ T6861] IPVS: ftp: loaded support on port[0] = 21 [ 47.222366][ T6858] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888120bb0200 (size 512): comm "syz-executor998", pid 6864, jiffies 4294941402 (age 7.940s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 02 bb 20 81 88 ff ff ........... .... 08 02 bb 20 81 88 ff ff 18 02 bb 20 81 88 ff ff ... ....... .... backtrace: [<000000009531a380>] __kmalloc+0x169/0x300 [<00000000cf5eb72c>] rds_message_alloc+0x3e/0xc0 [<000000001e676873>] rds_send_probe.constprop.0+0x42/0x380 [<000000003039f663>] rds_send_pong+0x1e/0x23 [<00000000d335c89a>] rds_recv_incoming+0x46c/0x570 [<00000000f3e35cfe>] rds_loop_xmit+0x86/0x100 [<000000002e64b226>] rds_send_xmit+0x5a9/0xb40 [<000000008ce6ea54>] rds_sendmsg+0x13fa/0x16d0 [<000000005ac8fae0>] sock_sendmsg+0x54/0x70 [<000000000b014f05>] __sys_sendto+0x148/0x1f0 [<000000004b4a031d>] __x64_sys_sendto+0x2a/0x30 [<00000000326a9124>] do_syscall_64+0x73/0x1f0 [<0000000004d91ec0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9