[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.186' (ECDSA) to the list of known hosts. syzkaller login: [ 134.731901][ T24] audit: type=1400 audit(1597138730.558:8): avc: denied { execmem } for pid=6486 comm="syz-executor821" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program [ 142.082458][ T6502] FS-Cache: Duplicate cookie detected [ 142.087888][ T6502] FS-Cache: O-cookie c=000000004bfbf559 [p=000000003b6b4276 fl=222 nc=0 na=1] [ 142.096738][ T6502] FS-Cache: O-cookie d=00000000b3eabaeb n=0000000098a5d37d [ 142.103909][ T6502] FS-Cache: O-key=[10] '34323934393531343831' [ 142.109977][ T6502] FS-Cache: N-cookie c=000000008bd2da53 [p=000000003b6b4276 fl=2 nc=0 na=1] [ 142.118729][ T6502] FS-Cache: N-cookie d=00000000b3eabaeb n=00000000b63c1c06 [ 142.125914][ T6502] FS-Cache: N-key=[10] '34323934393531343831' [ 149.082304][ T6492] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888119f09600 (size 32): comm "syz-executor821", pid 6502, jiffies 4294951481 (age 21.240s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 34 38 31 00 1a 81 88 ff ff 4294951481...... 01 00 00 00 03 00 00 00 11 00 00 00 00 00 00 00 ................ backtrace: [<00000000f9703af4>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000de3f9446>] v9fs_session_init+0x5a1/0x840 [<00000000b79bf12c>] v9fs_mount+0x56/0x390 [<000000001e1a098f>] legacy_get_tree+0x26/0x70 [<00000000ac8cfb68>] vfs_get_tree+0x28/0xe0 [<000000004529d8df>] path_mount+0x90e/0xda0 [<00000000dc5c0ff0>] __x64_sys_mount+0x140/0x190 [<00000000a8b90db4>] do_syscall_64+0x2d/0x70 [<00000000167cbb6d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119f09600 (size 32): comm "syz-executor821", pid 6502, jiffies 4294951481 (age 22.480s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 34 38 31 00 1a 81 88 ff ff 4294951481...... 01 00 00 00 03 00 00 00 11 00 00 00 00 00 00 00 ................ backtrace: [<00000000f9703af4>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000de3f9446>] v9fs_session_init+0x5a1/0x840 [<00000000b79bf12c>] v9fs_mount+0x56/0x390 [<000000001e1a098f>] legacy_get_tree+0x26/0x70 [<00000000ac8cfb68>] vfs_get_tree+0x28/0xe0 [<000000004529d8df>] path_mount+0x90e/0xda0 [<00000000dc5c0ff0>] __x64_sys_mount+0x140/0x190 [<00000000a8b90db4>] do_syscall_64+0x2d/0x70 [<00000000167cbb6d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119f09600 (size 32): comm "syz-executor821", pid 6502, jiffies 4294951481 (age 23.700s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 34 38 31 00 1a 81 88 ff ff 4294951481...... 01 00 00 00 03 00 00 00 11 00 00 00 00 00 00 00 ................ backtrace: [<00000000f9703af4>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000de3f9446>] v9fs_session_init+0x5a1/0x840 [<00000000b79bf12c>] v9fs_mount+0x56/0x390 [<000000001e1a098f>] legacy_get_tree+0x26/0x70 [<00000000ac8cfb68>] vfs_get_tree+0x28/0xe0 [<000000004529d8df>] path_mount+0x90e/0xda0 [<00000000dc5c0ff0>] __x64_sys_mount+0x140/0x190 [<00000000a8b90db4>] do_syscall_64+0x2d/0x70 [<00000000167cbb6d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119f09600 (size 32): comm "syz-executor821", pid 6502, jiffies 4294951481 (age 24.930s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 34 38 31 00 1a 81 88 ff ff 4294951481...... 01 00 00 00 03 00 00 00 11 00 00 00 00 00 00 00 ................ backtrace: [<00000000f9703af4>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000de3f9446>] v9fs_session_init+0x5a1/0x840 [<00000000b79bf12c>] v9fs_mount+0x56/0x390 [<000000001e1a098f>] legacy_get_tree+0x26/0x70 [<00000000ac8cfb68>] vfs_get_tree+0x28/0xe0 [<000000004529d8df>] path_mount+0x90e/0xda0 [<00000000dc5c0ff0>] __x64_sys_mount+0x140/0x190 [<00000000a8b90db4>] do_syscall_64+0x2d/0x70 [<00000000167cbb6d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119f09600 (size 32): comm "syz-executor821", pid 6502, jiffies 4294951481 (age 26.160s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 34 38 31 00 1a 81 88 ff ff 4294951481...... 01 00 00 00 03 00 00 00 11 00 00 00 00 00 00 00 ................ backtrace: [<00000000f9703af4>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000de3f9446>] v9fs_session_init+0x5a1/0x840 [<00000000b79bf12c>] v9fs_mount+0x56/0x390 [<000000001e1a098f>] legacy_get_tree+0x26/0x70 [<00000000ac8cfb68>] vfs_get_tree+0x28/0xe0 [<000000004529d8df>] path_mount+0x90e/0xda0 [<00000000dc5c0ff0>] __x64_sys_mount+0x140/0x190 [<00000000a8b90db4>] do_syscall_64+0x2d/0x70 [<00000000167cbb6d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119f09600 (size 32): comm "syz-executor821", pid 6502, jiffies 4294951481 (age 27.380s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 34 38 31 00 1a 81 88 ff ff 4294951481...... 01 00 00 00 03 00 00 00 11 00 00 00 00 00 00 00 ................ backtrace: [<00000000f9703af4>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000de3f9446>] v9fs_session_init+0x5a1/0x840 [<00000000b79bf12c>] v9fs_mount+0x56/0x390 [<000000001e1a098f>] legacy_get_tree+0x26/0x70 [<00000000ac8cfb68>] vfs_get_tree+0x28/0xe0 [<000000004529d8df>] path_mount+0x90e/0xda0 [<00000000dc5c0ff0>] __x64_sys_mount+0x140/0x190 [<00000000a8b90db4>] do_syscall_64+0x2d/0x70 [<00000000167cbb6d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119f09600 (size 32): comm "syz-executor821", pid 6502, jiffies 4294951481 (age 28.630s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 34 38 31 00 1a 81 88 ff ff 4294951481...... 01 00 00 00 03 00 00 00 11 00 00 00 00 00 00 00 ................ backtrace: [<00000000f9703af4>] v9fs_cache_session_get_cookie+0x98/0x100 [<00000000de3f9446>] v9fs_session_init+0x5a1/0x840 [<00000000b79bf12c>] v9fs_mount+0x56/0x390 [<000000001e1a098f>] legacy_get_tree+0x26/0x70 [<00000000ac8cfb68>] vfs_get_tree+0x28/0xe0 [<000000004529d8df>] path_mount+0x90e/0xda0 [<00000000dc5c0ff0>] __x64_sys_mount+0x140/0x190 [<00000000a8b90db4>] do_syscall_64+0x2d/0x70 [<00000000167cbb6d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program