[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. syzkaller login: [ 36.972865][ T24] audit: type=1400 audit(1597307183.251:8): avc: denied { execmem } for pid=6469 comm="syz-executor465" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program [ 44.263393][ T6472] IPVS: ftp: loaded support on port[0] = 21 executing program [ 50.810942][ T6472] kmemleak: 61 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 57.198149][ T6472] kmemleak: 54 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881180e4b00 (size 256): comm "syz-executor465", pid 6494, jiffies 4294941703 (age 13.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ab353c65>] tcindex_set_parms+0xa3/0x9d0 [<000000005749b6f4>] tcindex_change+0xcf/0x110 [<0000000058b6497e>] tc_new_tfilter+0x8b0/0xe30 [<000000002d05de32>] rtnetlink_rcv_msg+0x364/0x460 [<000000001f8e2761>] netlink_rcv_skb+0x5b/0x180 [<0000000011b4cca1>] netlink_unicast+0x2b6/0x3c0 [<00000000b3a90d39>] netlink_sendmsg+0x2ba/0x570 [<00000000e4a1af86>] sock_sendmsg+0x4c/0x60 [<000000006ce89706>] ____sys_sendmsg+0x2c4/0x2f0 [<0000000070840485>] ___sys_sendmsg+0x81/0xc0 [<00000000fb27d642>] __sys_sendmsg+0x77/0xe0 [<000000006c49f31a>] do_syscall_64+0x2d/0x70 [<0000000015d7fa13>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116546d00 (size 256): comm "syz-executor465", pid 6494, jiffies 4294941703 (age 13.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000374a17f7>] tcindex_alloc_perfect_hash+0x88/0x110 [<00000000548d0200>] tcindex_set_parms+0x8b0/0x9d0 [<000000005749b6f4>] tcindex_change+0xcf/0x110 [<0000000058b6497e>] tc_new_tfilter+0x8b0/0xe30 [<000000002d05de32>] rtnetlink_rcv_msg+0x364/0x460 [<000000001f8e2761>] netlink_rcv_skb+0x5b/0x180 [<0000000011b4cca1>] netlink_unicast+0x2b6/0x3c0 [<00000000b3a90d39>] netlink_sendmsg+0x2ba/0x570 [<00000000e4a1af86>] sock_sendmsg+0x4c/0x60 [<000000006ce89706>] ____sys_sendmsg+0x2c4/0x2f0 [<0000000070840485>] ___sys_sendmsg+0x81/0xc0 [<00000000fb27d642>] __sys_sendmsg+0x77/0xe0 [<000000006c49f31a>] do_syscall_64+0x2d/0x70 [<0000000015d7fa13>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888116546c00 (size 256): comm "syz-executor465", pid 6494, jiffies 4294941703 (age 13.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000374a17f7>] tcindex_alloc_perfect_hash+0x88/0x110 [<00000000548d0200>] tcindex_set_parms+0x8b0/0x9d0 [<000000005749b6f4>] tcindex_change+0xcf/0x110 [<0000000058b6497e>] tc_new_tfilter+0x8b0/0xe30 [<000000002d05de32>] rtnetlink_rcv_msg+0x364/0x460 [<000000001f8e2761>] netlink_rcv_skb+0x5b/0x180 [<0000000011b4cca1>] netlink_unicast+0x2b6/0x3c0 [<00000000b3a90d39>] netlink_sendmsg+0x2ba/0x570 [<00000000e4a1af86>] sock_sendmsg+0x4c/0x60 [<000000006ce89706>] ____sys_sendmsg+0x2c4/0x2f0 [<0000000070840485>] ___sys_sendmsg+0x81/0xc0 [<00000000fb27d642>] __sys_sendmsg+0x77/0xe0 [<000000006c49f31a>] do_syscall_64+0x2d/0x70 [<0000000015d7fa13>] entry_SYSCALL_64_after_hwframe+0x44/0xa9