[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.33' (ECDSA) to the list of known hosts. syzkaller login: [ 135.760855][ T26] audit: type=1400 audit(1590470151.615:8): avc: denied { execmem } for pid=6636 comm="syz-executor892" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program [ 143.217653][ T6656] FS-Cache: Duplicate cookie detected [ 143.223070][ T6656] FS-Cache: O-cookie c=00000000a2dabfd6 [p=0000000001eed225 fl=222 nc=0 na=1] [ 143.223072][ T6656] FS-Cache: O-cookie d=00000000b883c05b n=000000000bb18e60 [ 143.223074][ T6656] FS-Cache: O-key=[13] '656d30707070306e6f6465765e' [ 143.223090][ T6656] FS-Cache: N-cookie c=00000000a0e296b8 [p=0000000001eed225 fl=2 nc=0 na=1] [ 143.223092][ T6656] FS-Cache: N-cookie d=00000000b883c05b n=000000008b44e318 [ 143.223093][ T6656] FS-Cache: N-key=[13] '656d30707070306e6f6465765e' [ 143.270291][ T6674] 9pnet: Insufficient options for proto=fd [ 143.274083][ T6675] 9pnet: Insufficient options for proto=fd [ 143.286364][ T6678] 9pnet: Insufficient options for proto=fd [ 143.287160][ T6677] 9pnet: Insufficient options for proto=fd [ 150.284039][ T6642] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811cca6aa0 (size 32): comm "syz-executor892", pid 6656, jiffies 4294951591 (age 22.400s) hex dump (first 32 bytes): 65 6d 30 70 70 70 30 6e 6f 64 65 76 5e 00 ff ff em0ppp0nodev^... 80 c2 6c 04 00 ea ff ff 40 c2 6c 04 00 ea ff ff ..l.....@.l..... backtrace: [<000000009e6b1994>] kmemdup_nul+0x2d/0x70 [<0000000091c9d27f>] v9fs_session_init+0x29e/0x880 [<000000007156c30d>] v9fs_mount+0x56/0x390 [<00000000bc3a0eb1>] legacy_get_tree+0x23/0x70 [<000000007b50097b>] vfs_get_tree+0x28/0xe0 [<00000000cdce2c99>] do_mount+0x958/0xcd0 [<00000000948f5fa6>] __x64_sys_mount+0xb0/0x120 [<0000000087a0a4c1>] do_syscall_64+0x6e/0x220 [<000000008d8a45a9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811cca6aa0 (size 32): comm "syz-executor892", pid 6656, jiffies 4294951591 (age 23.680s) hex dump (first 32 bytes): 65 6d 30 70 70 70 30 6e 6f 64 65 76 5e 00 ff ff em0ppp0nodev^... 80 c2 6c 04 00 ea ff ff 40 c2 6c 04 00 ea ff ff ..l.....@.l..... backtrace: [<000000009e6b1994>] kmemdup_nul+0x2d/0x70 [<0000000091c9d27f>] v9fs_session_init+0x29e/0x880 [<000000007156c30d>] v9fs_mount+0x56/0x390 [<00000000bc3a0eb1>] legacy_get_tree+0x23/0x70 [<000000007b50097b>] vfs_get_tree+0x28/0xe0 [<00000000cdce2c99>] do_mount+0x958/0xcd0 [<00000000948f5fa6>] __x64_sys_mount+0xb0/0x120 [<0000000087a0a4c1>] do_syscall_64+0x6e/0x220 [<000000008d8a45a9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811cca6aa0 (size 32): comm "syz-executor892", pid 6656, jiffies 4294951591 (age 24.910s) hex dump (first 32 bytes): 65 6d 30 70 70 70 30 6e 6f 64 65 76 5e 00 ff ff em0ppp0nodev^... 80 c2 6c 04 00 ea ff ff 40 c2 6c 04 00 ea ff ff ..l.....@.l..... backtrace: [<000000009e6b1994>] kmemdup_nul+0x2d/0x70 [<0000000091c9d27f>] v9fs_session_init+0x29e/0x880 [<000000007156c30d>] v9fs_mount+0x56/0x390 [<00000000bc3a0eb1>] legacy_get_tree+0x23/0x70 [<000000007b50097b>] vfs_get_tree+0x28/0xe0 [<00000000cdce2c99>] do_mount+0x958/0xcd0 [<00000000948f5fa6>] __x64_sys_mount+0xb0/0x120 [<0000000087a0a4c1>] do_syscall_64+0x6e/0x220 [<000000008d8a45a9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811cca6aa0 (size 32): comm "syz-executor892", pid 6656, jiffies 4294951591 (age 26.120s) hex dump (first 32 bytes): 65 6d 30 70 70 70 30 6e 6f 64 65 76 5e 00 ff ff em0ppp0nodev^... 80 c2 6c 04 00 ea ff ff 40 c2 6c 04 00 ea ff ff ..l.....@.l..... backtrace: [<000000009e6b1994>] kmemdup_nul+0x2d/0x70 [<0000000091c9d27f>] v9fs_session_init+0x29e/0x880 [<000000007156c30d>] v9fs_mount+0x56/0x390 [<00000000bc3a0eb1>] legacy_get_tree+0x23/0x70 [<000000007b50097b>] vfs_get_tree+0x28/0xe0 [<00000000cdce2c99>] do_mount+0x958/0xcd0 [<00000000948f5fa6>] __x64_sys_mount+0xb0/0x120 [<0000000087a0a4c1>] do_syscall_64+0x6e/0x220 [<000000008d8a45a9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811cca6aa0 (size 32): comm "syz-executor892", pid 6656, jiffies 4294951591 (age 27.340s) hex dump (first 32 bytes): 65 6d 30 70 70 70 30 6e 6f 64 65 76 5e 00 ff ff em0ppp0nodev^... 80 c2 6c 04 00 ea ff ff 40 c2 6c 04 00 ea ff ff ..l.....@.l..... backtrace: [<000000009e6b1994>] kmemdup_nul+0x2d/0x70 [<0000000091c9d27f>] v9fs_session_init+0x29e/0x880 [<000000007156c30d>] v9fs_mount+0x56/0x390 [<00000000bc3a0eb1>] legacy_get_tree+0x23/0x70 [<000000007b50097b>] vfs_get_tree+0x28/0xe0 [<00000000cdce2c99>] do_mount+0x958/0xcd0 [<00000000948f5fa6>] __x64_sys_mount+0xb0/0x120 [<0000000087a0a4c1>] do_syscall_64+0x6e/0x220 [<000000008d8a45a9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811cca6aa0 (size 32): comm "syz-executor892", pid 6656, jiffies 4294951591 (age 28.550s) hex dump (first 32 bytes): 65 6d 30 70 70 70 30 6e 6f 64 65 76 5e 00 ff ff em0ppp0nodev^... 80 c2 6c 04 00 ea ff ff 40 c2 6c 04 00 ea ff ff ..l.....@.l..... backtrace: [<000000009e6b1994>] kmemdup_nul+0x2d/0x70 [<0000000091c9d27f>] v9fs_session_init+0x29e/0x880 [<000000007156c30d>] v9fs_mount+0x56/0x390 [<00000000bc3a0eb1>] legacy_get_tree+0x23/0x70 [<000000007b50097b>] vfs_get_tree+0x28/0xe0 [<00000000cdce2c99>] do_mount+0x958/0xcd0 [<00000000948f5fa6>] __x64_sys_mount+0xb0/0x120 [<0000000087a0a4c1>] do_syscall_64+0x6e/0x220 [<000000008d8a45a9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811cca6aa0 (size 32): comm "syz-executor892", pid 6656, jiffies 4294951591 (age 29.820s) hex dump (first 32 bytes): 65 6d 30 70 70 70 30 6e 6f 64 65 76 5e 00 ff ff em0ppp0nodev^... 80 c2 6c 04 00 ea ff ff 40 c2 6c 04 00 ea ff ff ..l.....@.l..... backtrace: [<000000009e6b1994>] kmemdup_nul+0x2d/0x70 [<0000000091c9d27f>] v9fs_session_init+0x29e/0x880 [<000000007156c30d>] v9fs_mount+0x56/0x390 [<00000000bc3a0eb1>] legacy_get_tree+0x23/0x70 [<000000007b50097b>] vfs_get_tree+0x28/0xe0 [<00000000cdce2c99>] do_mount+0x958/0xcd0 [<00000000948f5fa6>] __x64_sys_mount+0xb0/0x120 [<0000000087a0a4c1>] do_syscall_64+0x6e/0x220 [<000000008d8a45a9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811cca6aa0 (size 32): comm "syz-executor892", pid 6656, jiffies 4294951591 (age 29.890s) hex dump (first 32 bytes): 65 6d 30 70 70 70 30 6e 6f 64 65 76 5e 00 ff ff em0ppp0nodev^... 80 c2 6c 04 00 ea ff ff 40 c2 6c 04 00 ea ff ff ..l.....@.l..... backtrace: [<000000009e6b1994>] kmemdup_nul+0x2d/0x70 [<0000000091c9d27f>] v9fs_session_init+0x29e/0x880 [<000000007156c30d>] v9fs_mount+0x56/0x390 [<00000000bc3a0eb1>] legacy_get_tree+0x23/0x70 [<000000007b50097b>] vfs_get_tree+0x28/0xe0 [<00000000cdce2c99>] do_mount+0x958/0xcd0 [<00000000948f5fa6>] __x64_sys_mount+0xb0/0x120 [<0000000087a0a4c1>] do_syscall_64+0x6e/0x220 [<000000008d8a45a9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9