[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.116' (ECDSA) to the list of known hosts. syzkaller login: [ 45.328991][ T26] audit: type=1400 audit(1593733616.973:8): avc: denied { execmem } for pid=6494 comm="syz-executor635" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program [ 64.745624][ T6494] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 68.873021][ T6494] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811bd68c80 (size 128): comm "syz-executor635", pid 6495, jiffies 4294942531 (age 19.950s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 98 8c d6 1b 81 88 ff ff ................ backtrace: [<00000000353f7b4d>] tipc_group_create_member+0x38/0x180 [<000000001b828db8>] tipc_nametbl_build_group+0x90/0xe0 [<000000007bd9ae1b>] tipc_setsockopt+0x24a/0x580 [<000000003eaefd74>] __sys_setsockopt+0x112/0x230 [<00000000f44cd0e3>] __x64_sys_setsockopt+0x22/0x30 [<00000000b95e5b8a>] do_syscall_64+0x4c/0xe0 [<0000000054c18d3a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811be35280 (size 128): comm "syz-executor635", pid 6496, jiffies 4294943074 (age 14.520s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 98 52 e3 1b 81 88 ff ff .........R...... backtrace: [<00000000353f7b4d>] tipc_group_create_member+0x38/0x180 [<000000001b828db8>] tipc_nametbl_build_group+0x90/0xe0 [<000000007bd9ae1b>] tipc_setsockopt+0x24a/0x580 [<000000003eaefd74>] __sys_setsockopt+0x112/0x230 [<00000000f44cd0e3>] __x64_sys_setsockopt+0x22/0x30 [<00000000b95e5b8a>] do_syscall_64+0x4c/0xe0 [<0000000054c18d3a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9