[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.192' (ECDSA) to the list of known hosts. syzkaller login: [ 36.793003][ T24] audit: type=1400 audit(1598365533.692:8): avc: denied { execmem } for pid=6449 comm="syz-executor630" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program [ 50.190959][ T6449] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 56.421796][ T6449] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888118a39600 (size 128): comm "syz-executor630", pid 6452, jiffies 4294941665 (age 12.570s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 18 96 a3 18 81 88 ff ff ................ backtrace: [<00000000ad28ce2a>] tipc_group_create_member+0x38/0x180 [<00000000cfb548bb>] tipc_nametbl_build_group+0x90/0xe0 [<000000009ca944ee>] tipc_setsockopt+0x262/0x5d0 [<0000000038cf8e5a>] __sys_setsockopt+0x14b/0x270 [<0000000022d7b229>] __x64_sys_setsockopt+0x22/0x30 [<00000000572e4e22>] do_syscall_64+0x2d/0x70 [<000000005b1c93f2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811c385780 (size 128): comm "syz-executor630", pid 6453, jiffies 4294942187 (age 7.350s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 98 57 38 1c 81 88 ff ff .........W8..... backtrace: [<00000000ad28ce2a>] tipc_group_create_member+0x38/0x180 [<00000000cfb548bb>] tipc_nametbl_build_group+0x90/0xe0 [<000000009ca944ee>] tipc_setsockopt+0x262/0x5d0 [<0000000038cf8e5a>] __sys_setsockopt+0x14b/0x270 [<0000000022d7b229>] __x64_sys_setsockopt+0x22/0x30 [<00000000572e4e22>] do_syscall_64+0x2d/0x70 [<000000005b1c93f2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9