[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.43' (ECDSA) to the list of known hosts. syzkaller login: [ 51.046985][ T26] audit: type=1400 audit(1591952617.336:8): avc: denied { execmem } for pid=6469 comm="syz-executor221" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program [ 58.495513][ T6470] netlink: 8 bytes leftover after parsing attributes in process `syz-executor221'. executing program [ 64.067945][ T6471] netlink: 8 bytes leftover after parsing attributes in process `syz-executor221'. executing program [ 69.607191][ T6472] netlink: 8 bytes leftover after parsing attributes in process `syz-executor221'. executing program [ 75.168094][ T6473] netlink: 8 bytes leftover after parsing attributes in process `syz-executor221'. [ 80.563479][ T6469] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811e56f800 (size 128): comm "syz-executor221", pid 6470, jiffies 4294943125 (age 24.460s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000021b8300e>] ctnetlink_alloc_filter+0x3a/0x2a0 [<00000000adb3ab64>] ctnetlink_start+0x3a/0x80 [<00000000538523d4>] __netlink_dump_start+0x1a3/0x2e0 [<0000000052988833>] ctnetlink_get_conntrack+0x26d/0x2f0 [<000000007d4d8e5c>] nfnetlink_rcv_msg+0x32f/0x370 [<00000000df1d34fb>] netlink_rcv_skb+0x5a/0x180 [<0000000014d0ae77>] nfnetlink_rcv+0x83/0x1b0 [<00000000edfb144b>] netlink_unicast+0x20a/0x2f0 [<0000000024f1e510>] netlink_sendmsg+0x2b5/0x560 [<000000005467a641>] sock_sendmsg+0x4c/0x60 [<000000001432f3c2>] ____sys_sendmsg+0x2c4/0x2f0 [<000000004a43a4ab>] ___sys_sendmsg+0x8a/0xd0 [<000000003f0f4f52>] __sys_sendmsg+0x77/0xe0 [<0000000057090328>] do_syscall_64+0x6e/0x220 [<00000000d55eddd7>] entry_SYSCALL_64_after_hwframe+0x44/0xa9