[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.917873][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 32.917879][ T24] audit: type=1400 audit(1558472327.039:35): avc: denied { map } for pid=7059 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.77' (ECDSA) to the list of known hosts. [ 58.227326][ T24] audit: type=1400 audit(1558472352.349:36): avc: denied { map } for pid=7073 comm="syz-executor907" path="/root/syz-executor907235922" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 65.046321][ T7073] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 71.765238][ T7073] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881202b6800 (size 2048): comm "syz-executor907", pid 7074, jiffies 4294943781 (age 8.590s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1a 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000e25b5abe>] __kmalloc+0x161/0x2c0 [<00000000a1ae188a>] sk_prot_alloc+0xd6/0x170 [<00000000ded25bbe>] sk_alloc+0x35/0x2f0 [<000000002ecae075>] llc_sk_alloc+0x35/0x170 [<00000000551f7c47>] llc_ui_create+0x7b/0x140 [<0000000029027f0e>] __sock_create+0x164/0x250 [<000000008bdec225>] __sys_socket+0x69/0x110 [<00000000b6439228>] __x64_sys_socket+0x1e/0x30 [<00000000cec820c1>] do_syscall_64+0x76/0x1a0 [<000000000c32554f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811d750d00 (size 224): comm "syz-executor907", pid 7074, jiffies 4294943781 (age 8.600s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 f0 0c 24 81 88 ff ff 00 68 2b 20 81 88 ff ff ...$.....h+ .... backtrace: [<0000000053026172>] kmem_cache_alloc_node+0x153/0x2a0 [<00000000fa8f3c30>] __alloc_skb+0x6e/0x210 [<00000000d96fdafb>] alloc_skb_with_frags+0x5f/0x250 [<000000000a34a2e7>] sock_alloc_send_pskb+0x269/0x2a0 [<00000000ee39999b>] sock_alloc_send_skb+0x32/0x40 [<00000000e034d810>] llc_ui_sendmsg+0x10a/0x540 [<00000000c0bc8445>] sock_sendmsg+0x54/0x70 [<000000003b687167>] __sys_sendto+0x148/0x1f0 [<00000000922d78d9>] __x64_sys_sendto+0x2a/0x30 [<00000000cec820c1>] do_syscall_64+0x76/0x1a0 [<000000000c32554f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9