[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 51.912186][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 51.912192][ T24] audit: type=1400 audit(1559843344.646:35): avc: denied { map } for pid=7021 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.53' (ECDSA) to the list of known hosts. [ 118.926107][ T24] audit: type=1400 audit(1559843411.656:36): avc: denied { map } for pid=7033 comm="syz-executor032" path="/root/syz-executor032823518" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 186.066047][ T7033] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 192.963902][ T7033] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888124365a40 (size 1280): comm "syz-executor032", pid 7039, jiffies 4294952820 (age 37.550s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 80 dd 7b f4 00 00 00 00 ..........{..... 0a 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000dba9ec2e>] kmem_cache_alloc+0x134/0x270 [<0000000018c52d6d>] sk_prot_alloc+0x41/0x170 [<00000000d9c0caab>] sk_alloc+0x35/0x2f0 [<00000000700b302a>] inet6_create+0x115/0x4b0 [<00000000ce38b1e5>] __sock_create+0x164/0x250 [<000000007e6d40fd>] __sys_socket+0x69/0x110 [<0000000081e1179a>] __x64_sys_socket+0x1e/0x30 [<000000008d9383e5>] do_syscall_64+0x76/0x1a0 [<00000000af94d8fe>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811c5242e0 (size 32): comm "syz-executor032", pid 7039, jiffies 4294952820 (age 37.550s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 80 2a 7e 1c 81 88 ff ff .........*~..... e0 00 00 00 03 00 00 00 11 00 00 00 00 00 00 00 ................ backtrace: [<00000000f2ad7aa4>] kmem_cache_alloc_trace+0x13d/0x280 [<000000006402def6>] selinux_sk_alloc_security+0x48/0xb0 [<000000003eb97e8e>] security_sk_alloc+0x49/0x70 [<00000000911dc8be>] sk_prot_alloc+0x6e/0x170 [<00000000d9c0caab>] sk_alloc+0x35/0x2f0 [<00000000700b302a>] inet6_create+0x115/0x4b0 [<00000000ce38b1e5>] __sock_create+0x164/0x250 [<000000007e6d40fd>] __sys_socket+0x69/0x110 [<0000000081e1179a>] __x64_sys_socket+0x1e/0x30 [<000000008d9383e5>] do_syscall_64+0x76/0x1a0 [<00000000af94d8fe>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810cda0500 (size 224): comm "syz-executor032", pid 7039, jiffies 4294952820 (age 37.550s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 40 5a 36 24 81 88 ff ff ........@Z6$.... backtrace: [<00000000cde2b150>] kmem_cache_alloc_node+0x153/0x2a0 [<000000007abef54e>] __alloc_skb+0x6e/0x210 [<00000000a3781628>] sock_omalloc+0x4e/0x90 [<00000000b03335a4>] sock_zerocopy_alloc+0x3c/0xf0 [<000000001f1c54cc>] sock_zerocopy_realloc+0x7b/0x110 [<000000005dfc8b21>] __ip6_append_data.isra.0+0x8f4/0x10e0 [<0000000026660f42>] ip6_append_data+0xf1/0x180 [<00000000bc2dfdec>] udpv6_sendmsg+0x40c/0x1050 [<0000000066c57a32>] inet_sendmsg+0x64/0x120 [<000000008775abfa>] sock_sendmsg+0x54/0x70 [<000000002588ccb6>] __sys_sendto+0x148/0x1f0 [<0000000063072ddd>] __x64_sys_sendto+0x2a/0x30 [<000000008d9383e5>] do_syscall_64+0x76/0x1a0 [<00000000af94d8fe>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811deadc00 (size 512): comm "syz-executor032", pid 7039, jiffies 4294952820 (age 37.550s) hex dump (first 32 bytes): 7f 0f 00 00 00 00 00 00 69 63 65 73 2f 76 69 72 ........ices/vir 74 75 61 6c 2f 62 6c 6f 63 6b 2f 6e 62 64 31 32 tual/block/nbd12 backtrace: [<00000000d40df006>] kmem_cache_alloc_node_trace+0x15b/0x2a0 [<00000000807a1f33>] __kmalloc_node_track_caller+0x38/0x50 [<0000000093251f94>] __kmalloc_reserve.isra.0+0x40/0xb0 [<00000000aee5663a>] __alloc_skb+0xa0/0x210 [<00000000a3781628>] sock_omalloc+0x4e/0x90 [<00000000b03335a4>] sock_zerocopy_alloc+0x3c/0xf0 [<000000001f1c54cc>] sock_zerocopy_realloc+0x7b/0x110 [<000000005dfc8b21>] __ip6_append_data.isra.0+0x8f4/0x10e0 [<0000000026660f42>] ip6_append_data+0xf1/0x180 [<00000000bc2dfdec>] udpv6_sendmsg+0x40c/0x1050 [<0000000066c57a32>] inet_sendmsg+0x64/0x120 [<000000008775abfa>] sock_sendmsg+0x54/0x70 [<000000002588ccb6>] __sys_sendto+0x148/0x1f0 [<0000000063072ddd>] __x64_sys_sendto+0x2a/0x30 [<000000008d9383e5>] do_syscall_64+0x76/0x1a0 [<00000000af94d8fe>] entry_SYSCALL_64_after_hwframe+0x44/0xa9