[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.19' (ECDSA) to the list of known hosts. syzkaller login: [ 37.955901][ T25] audit: type=1400 audit(1600755244.435:8): avc: denied { execmem } for pid=6465 comm="syz-executor537" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program [ 45.432887][ T6468] UDF-fs: error (device loop0): udf_process_sequence: Primary Volume Descriptor not found! [ 45.443173][ T6468] UDF-fs: error (device loop0): udf_process_sequence: Primary Volume Descriptor not found! [ 45.453720][ T6468] UDF-fs: Scanning with blocksize 512 failed [ 45.461539][ T6468] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 45.469327][ T6468] UDF-fs: Scanning with blocksize 1024 failed [ 45.477458][ T6468] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 45.485759][ T6468] UDF-fs: Scanning with blocksize 2048 failed [ 45.493041][ T6468] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 45.503794][ T6468] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 45.512044][ T6468] UDF-fs: Scanning with blocksize 4096 failed [ 45.518223][ T6468] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) executing program [ 51.107162][ T6475] UDF-fs: error (device loop0): udf_process_sequence: Primary Volume Descriptor not found! [ 51.117391][ T6475] UDF-fs: error (device loop0): udf_process_sequence: Primary Volume Descriptor not found! [ 51.127833][ T6475] UDF-fs: Scanning with blocksize 512 failed [ 51.135541][ T6475] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 51.143588][ T6475] UDF-fs: Scanning with blocksize 1024 failed [ 51.151694][ T6475] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 51.159652][ T6475] UDF-fs: Scanning with blocksize 2048 failed [ 51.166410][ T6475] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 51.176872][ T6475] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 51.184767][ T6475] UDF-fs: Scanning with blocksize 4096 failed [ 51.191048][ T6475] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) executing program [ 56.767098][ T6482] UDF-fs: error (device loop0): udf_process_sequence: Primary Volume Descriptor not found! [ 56.777334][ T6482] UDF-fs: error (device loop0): udf_process_sequence: Primary Volume Descriptor not found! [ 56.787745][ T6482] UDF-fs: Scanning with blocksize 512 failed [ 56.795611][ T6482] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 56.803621][ T6482] UDF-fs: Scanning with blocksize 1024 failed [ 56.811677][ T6482] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 56.819743][ T6482] UDF-fs: Scanning with blocksize 2048 failed [ 56.826486][ T6482] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 56.837144][ T6482] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 56.845275][ T6482] UDF-fs: Scanning with blocksize 4096 failed [ 56.851668][ T6482] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 58.101205][ T6465] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 64.541903][ T6465] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811e7d3600 (size 512): comm "syz-executor537", pid 6468, jiffies 4294941807 (age 19.190s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000dc97bdd2>] udf_process_sequence+0x7e/0x1080 [<0000000026489a34>] udf_check_anchor_block+0xdc/0x1a0 [<0000000070837f78>] udf_scan_anchors+0x9e/0x240 [<000000008460a120>] udf_load_vrs+0x1be/0x3b0 [<00000000d81602a0>] udf_fill_super+0x286/0x7a5 [<0000000064c94d38>] mount_bdev+0x1d3/0x210 [<0000000095736b2c>] legacy_get_tree+0x26/0x70 [<00000000385fec14>] vfs_get_tree+0x28/0xe0 [<00000000bbd64ece>] path_mount+0x90e/0xda0 [<00000000af293cd8>] __x64_sys_mount+0x140/0x190 [<00000000a2acb416>] do_syscall_64+0x2d/0x70 [<00000000877bf1c4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811f792600 (size 512): comm "syz-executor537", pid 6475, jiffies 4294942374 (age 13.520s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000dc97bdd2>] udf_process_sequence+0x7e/0x1080 [<0000000026489a34>] udf_check_anchor_block+0xdc/0x1a0 [<0000000070837f78>] udf_scan_anchors+0x9e/0x240 [<000000008460a120>] udf_load_vrs+0x1be/0x3b0 [<00000000d81602a0>] udf_fill_super+0x286/0x7a5 [<0000000064c94d38>] mount_bdev+0x1d3/0x210 [<0000000095736b2c>] legacy_get_tree+0x26/0x70 [<00000000385fec14>] vfs_get_tree+0x28/0xe0 [<00000000bbd64ece>] path_mount+0x90e/0xda0 [<00000000af293cd8>] __x64_sys_mount+0x140/0x190 [<00000000a2acb416>] do_syscall_64+0x2d/0x70 [<00000000877bf1c4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811c938200 (size 512): comm "syz-executor537", pid 6482, jiffies 4294942940 (age 7.860s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000dc97bdd2>] udf_process_sequence+0x7e/0x1080 [<0000000026489a34>] udf_check_anchor_block+0xdc/0x1a0 [<0000000070837f78>] udf_scan_anchors+0x9e/0x240 [<000000008460a120>] udf_load_vrs+0x1be/0x3b0 [<00000000d81602a0>] udf_fill_super+0x286/0x7a5 [<0000000064c94d38>] mount_bdev+0x1d3/0x210 [<0000000095736b2c>] legacy_get_tree+0x26/0x70 [<00000000385fec14>] vfs_get_tree+0x28/0xe0 [<00000000bbd64ece>] path_mount+0x90e/0xda0 [<00000000af293cd8>] __x64_sys_mount+0x140/0x190 [<00000000a2acb416>] do_syscall_64+0x2d/0x70 [<00000000877bf1c4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9