[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.376615][ T25] kauditd_printk_skb: 20 callbacks suppressed [ 29.376621][ T25] audit: type=1400 audit(1573315677.992:41): avc: denied { map } for pid=6914 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.68' (ECDSA) to the list of known hosts. [ 54.610459][ T25] audit: type=1400 audit(1573315703.232:42): avc: denied { map } for pid=6929 comm="syz-executor652" path="/root/syz-executor652726164" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program [ 67.978316][ T6929] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 71.036506][ T3780] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811466b640 (size 1376): comm "syz-executor652", pid 6930, jiffies 4294943402 (age 13.460s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2b 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 +..@............ backtrace: [<00000000c2e7086e>] kmem_cache_alloc+0x13f/0x2c0 [<000000009756f308>] sk_prot_alloc+0x41/0x170 [<00000000a6b02edc>] sk_alloc+0x35/0x2f0 [<0000000098e69b54>] smc_sock_alloc+0x4a/0x1a0 [<00000000ac6fd0fe>] smc_create+0x6b/0x160 [<000000005c668205>] __sock_create+0x164/0x250 [<0000000046ae7530>] __sys_socket+0x69/0x110 [<00000000880f6a7e>] __x64_sys_socket+0x1e/0x30 [<000000007a69ca08>] do_syscall_64+0x73/0x1f0 [<00000000eb803a42>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881233d04c0 (size 32): comm "syz-executor652", pid 6930, jiffies 4294943402 (age 13.460s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e1 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<00000000e2565438>] kmem_cache_alloc_trace+0x145/0x2c0 [<00000000833d1028>] selinux_sk_alloc_security+0x48/0xb0 [<000000001d7a11eb>] security_sk_alloc+0x49/0x70 [<00000000f99f4ac6>] sk_prot_alloc+0xa1/0x170 [<00000000a6b02edc>] sk_alloc+0x35/0x2f0 [<0000000098e69b54>] smc_sock_alloc+0x4a/0x1a0 [<00000000ac6fd0fe>] smc_create+0x6b/0x160 [<000000005c668205>] __sock_create+0x164/0x250 [<0000000046ae7530>] __sys_socket+0x69/0x110 [<00000000880f6a7e>] __x64_sys_socket+0x1e/0x30 [<000000007a69ca08>] do_syscall_64+0x73/0x1f0 [<00000000eb803a42>] entry_SYSCALL_64_after_hwframe+0x44/0xa9