[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.39' (ECDSA) to the list of known hosts. syzkaller login: [ 61.905565][ T26] audit: type=1400 audit(1589820956.071:8): avc: denied { execmem } for pid=6633 comm="syz-executor957" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program [ 90.880495][ T6633] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 93.145952][ T6633] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881187e3600 (size 32): comm "syz-executor957", pid 6634, jiffies 4294944189 (age 23.990s) hex dump (first 32 bytes): c0 a8 64 84 ff ff ff ff 18 a2 b4 83 ff ff ff ff ..d............. 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<000000009a8891de>] genl_rcv_msg+0x360/0x520 [<0000000065f265ea>] netlink_rcv_skb+0x5a/0x180 [<00000000b9a29475>] genl_rcv+0x24/0x40 [<00000000443a50f0>] netlink_unicast+0x20a/0x2f0 [<0000000048a9fef3>] netlink_sendmsg+0x2b5/0x560 [<00000000c619d696>] sock_sendmsg+0x4c/0x60 [<00000000644ebb01>] ____sys_sendmsg+0x2c0/0x2f0 [<000000003b240efd>] ___sys_sendmsg+0x8a/0xd0 [<000000003b246a5e>] __sys_sendmsg+0x77/0xe0 [<00000000272d393a>] do_syscall_64+0x6e/0x220 [<000000007fe28d37>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881187e35a0 (size 32): comm "syz-executor957", pid 6635, jiffies 4294944734 (age 18.540s) hex dump (first 32 bytes): c0 a8 64 84 ff ff ff ff 18 a2 b4 83 ff ff ff ff ..d............. 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<000000009a8891de>] genl_rcv_msg+0x360/0x520 [<0000000065f265ea>] netlink_rcv_skb+0x5a/0x180 [<00000000b9a29475>] genl_rcv+0x24/0x40 [<00000000443a50f0>] netlink_unicast+0x20a/0x2f0 [<0000000048a9fef3>] netlink_sendmsg+0x2b5/0x560 [<00000000c619d696>] sock_sendmsg+0x4c/0x60 [<00000000644ebb01>] ____sys_sendmsg+0x2c0/0x2f0 [<000000003b240efd>] ___sys_sendmsg+0x8a/0xd0 [<000000003b246a5e>] __sys_sendmsg+0x77/0xe0 [<00000000272d393a>] do_syscall_64+0x6e/0x220 [<000000007fe28d37>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881187e3420 (size 32): comm "syz-executor957", pid 6636, jiffies 4294945278 (age 13.100s) hex dump (first 32 bytes): c0 a8 64 84 ff ff ff ff 18 a2 b4 83 ff ff ff ff ..d............. 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<000000009a8891de>] genl_rcv_msg+0x360/0x520 [<0000000065f265ea>] netlink_rcv_skb+0x5a/0x180 [<00000000b9a29475>] genl_rcv+0x24/0x40 [<00000000443a50f0>] netlink_unicast+0x20a/0x2f0 [<0000000048a9fef3>] netlink_sendmsg+0x2b5/0x560 [<00000000c619d696>] sock_sendmsg+0x4c/0x60 [<00000000644ebb01>] ____sys_sendmsg+0x2c0/0x2f0 [<000000003b240efd>] ___sys_sendmsg+0x8a/0xd0 [<000000003b246a5e>] __sys_sendmsg+0x77/0xe0 [<00000000272d393a>] do_syscall_64+0x6e/0x220 [<000000007fe28d37>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881187909c0 (size 32): comm "syz-executor957", pid 6637, jiffies 4294945824 (age 7.640s) hex dump (first 32 bytes): c0 a8 64 84 ff ff ff ff 18 a2 b4 83 ff ff ff ff ..d............. 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 ff ff ........_t:s0... backtrace: [<000000009a8891de>] genl_rcv_msg+0x360/0x520 [<0000000065f265ea>] netlink_rcv_skb+0x5a/0x180 [<00000000b9a29475>] genl_rcv+0x24/0x40 [<00000000443a50f0>] netlink_unicast+0x20a/0x2f0 [<0000000048a9fef3>] netlink_sendmsg+0x2b5/0x560 [<00000000c619d696>] sock_sendmsg+0x4c/0x60 [<00000000644ebb01>] ____sys_sendmsg+0x2c0/0x2f0 [<000000003b240efd>] ___sys_sendmsg+0x8a/0xd0 [<000000003b246a5e>] __sys_sendmsg+0x77/0xe0 [<00000000272d393a>] do_syscall_64+0x6e/0x220 [<000000007fe28d37>] entry_SYSCALL_64_after_hwframe+0x44/0xa9