[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.235' (ECDSA) to the list of known hosts. syzkaller login: [ 52.118442][ T26] audit: type=1400 audit(1593679863.515:8): avc: denied { execmem } for pid=6441 comm="syz-executor425" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program [ 71.315929][ T3646] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 77.635991][ T6441] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888118cc4700 (size 224): comm "syz-executor425", pid 6443, jiffies 4294943726 (age 13.140s) hex dump (first 32 bytes): 00 45 cc 18 81 88 ff ff 00 00 00 00 00 00 00 00 .E.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000094c02615>] __alloc_skb+0x5e/0x250 [<00000000e5386cbd>] kcm_sendmsg+0x3b6/0xa50 [<00000000f1613a8a>] sock_sendmsg+0x4c/0x60 [<00000000aba7096c>] ____sys_sendmsg+0x118/0x2f0 [<000000007cd4be39>] ___sys_sendmsg+0x81/0xc0 [<0000000098b1ee50>] __sys_sendmmsg+0xda/0x230 [<000000009a409d75>] __x64_sys_sendmmsg+0x24/0x30 [<0000000045f49211>] do_syscall_64+0x4c/0xe0 [<0000000053b1fefd>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811c5e9200 (size 512): comm "syz-executor425", pid 6443, jiffies 4294943726 (age 13.140s) hex dump (first 32 bytes): 6c 69 62 75 64 65 76 00 fe ed ca fe 28 00 00 00 libudev.....(... 28 00 00 00 94 00 00 00 8a fa 90 c8 00 00 00 00 (............... backtrace: [<00000000f3b93311>] __alloc_skb+0x99/0x250 [<00000000e5386cbd>] kcm_sendmsg+0x3b6/0xa50 [<00000000f1613a8a>] sock_sendmsg+0x4c/0x60 [<00000000aba7096c>] ____sys_sendmsg+0x118/0x2f0 [<000000007cd4be39>] ___sys_sendmsg+0x81/0xc0 [<0000000098b1ee50>] __sys_sendmmsg+0xda/0x230 [<000000009a409d75>] __x64_sys_sendmmsg+0x24/0x30 [<0000000045f49211>] do_syscall_64+0x4c/0xe0 [<0000000053b1fefd>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118cc4500 (size 224): comm "syz-executor425", pid 6443, jiffies 4294943726 (age 13.140s) hex dump (first 32 bytes): 00 44 cc 18 81 88 ff ff 00 00 00 00 00 00 00 00 .D.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000094c02615>] __alloc_skb+0x5e/0x250 [<00000000e5386cbd>] kcm_sendmsg+0x3b6/0xa50 [<00000000f1613a8a>] sock_sendmsg+0x4c/0x60 [<00000000aba7096c>] ____sys_sendmsg+0x118/0x2f0 [<000000007cd4be39>] ___sys_sendmsg+0x81/0xc0 [<0000000098b1ee50>] __sys_sendmmsg+0xda/0x230 [<000000009a409d75>] __x64_sys_sendmmsg+0x24/0x30 [<0000000045f49211>] do_syscall_64+0x4c/0xe0 [<0000000053b1fefd>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811c5e9800 (size 512): comm "syz-executor425", pid 6443, jiffies 4294943726 (age 13.140s) hex dump (first 32 bytes): 61 64 64 40 2f 64 65 76 69 63 65 73 2f 76 69 72 add@/devices/vir 74 75 61 6c 2f 74 74 79 2f 70 74 79 72 31 00 41 tual/tty/ptyr1.A backtrace: [<00000000f3b93311>] __alloc_skb+0x99/0x250 [<00000000e5386cbd>] kcm_sendmsg+0x3b6/0xa50 [<00000000f1613a8a>] sock_sendmsg+0x4c/0x60 [<00000000aba7096c>] ____sys_sendmsg+0x118/0x2f0 [<000000007cd4be39>] ___sys_sendmsg+0x81/0xc0 [<0000000098b1ee50>] __sys_sendmmsg+0xda/0x230 [<000000009a409d75>] __x64_sys_sendmmsg+0x24/0x30 [<0000000045f49211>] do_syscall_64+0x4c/0xe0 [<0000000053b1fefd>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118cc4400 (size 224): comm "syz-executor425", pid 6443, jiffies 4294943726 (age 13.140s) hex dump (first 32 bytes): 00 46 cc 18 81 88 ff ff 00 00 00 00 00 00 00 00 .F.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000094c02615>] __alloc_skb+0x5e/0x250 [<00000000e5386cbd>] kcm_sendmsg+0x3b6/0xa50 [<00000000f1613a8a>] sock_sendmsg+0x4c/0x60 [<00000000aba7096c>] ____sys_sendmsg+0x118/0x2f0 [<000000007cd4be39>] ___sys_sendmsg+0x81/0xc0 [<0000000098b1ee50>] __sys_sendmmsg+0xda/0x230 [<000000009a409d75>] __x64_sys_sendmmsg+0x24/0x30 [<0000000045f49211>] do_syscall_64+0x4c/0xe0 [<0000000053b1fefd>] entry_SYSCALL_64_after_hwframe+0x44/0xa9