[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.237' (ECDSA) to the list of known hosts. syzkaller login: [ 57.008222][ T25] audit: type=1400 audit(1589882431.741:8): avc: denied { execmem } for pid=6627 comm="syz-executor825" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program [ 71.402567][ T3833] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) executing program [ 82.404955][ T6627] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 84.716679][ T6627] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811c2f9880 (size 128): comm "syz-executor825", pid 6629, jiffies 4294944416 (age 13.340s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 98 98 2f 1c 81 88 ff ff ........../..... backtrace: [<000000005f97f9e3>] tipc_group_create_member+0x39/0x180 [<00000000aa41c6cf>] tipc_nametbl_build_group+0x90/0xe0 [<00000000ae935b5a>] tipc_setsockopt+0x24e/0x4d0 [<000000009befef62>] __sys_setsockopt+0x112/0x230 [<000000007fb3dea6>] __x64_sys_setsockopt+0x22/0x30 [<000000005164ad0e>] do_syscall_64+0x6e/0x220 [<00000000f364f08b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811c2f9380 (size 128): comm "syz-executor825", pid 6630, jiffies 4294944971 (age 7.790s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 98 93 2f 1c 81 88 ff ff ........../..... backtrace: [<000000005f97f9e3>] tipc_group_create_member+0x39/0x180 [<00000000aa41c6cf>] tipc_nametbl_build_group+0x90/0xe0 [<00000000ae935b5a>] tipc_setsockopt+0x24e/0x4d0 [<000000009befef62>] __sys_setsockopt+0x112/0x230 [<000000007fb3dea6>] __x64_sys_setsockopt+0x22/0x30 [<000000005164ad0e>] do_syscall_64+0x6e/0x220 [<00000000f364f08b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9