[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.12' (ECDSA) to the list of known hosts. syzkaller login: [ 41.205047][ T25] audit: type=1400 audit(1588234596.653:8): avc: denied { execmem } for pid=6673 comm="syz-executor429" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program executing program executing program executing program [ 87.772026][ T6673] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811cb459a0 (size 32): comm "syz-executor429", pid 6677, jiffies 4294943747 (age 25.350s) hex dump (first 32 bytes): 00 a8 64 84 ff ff ff ff 60 9e b4 83 ff ff ff ff ..d.....`....... 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<00000000d4a6411c>] genl_rcv_msg+0x360/0x520 [<00000000ce1970c4>] netlink_rcv_skb+0x5a/0x180 [<0000000050e934dc>] genl_rcv+0x24/0x40 [<00000000ed0dca5b>] netlink_unicast+0x20a/0x2f0 [<00000000326f2b0b>] netlink_sendmsg+0x2b5/0x560 [<00000000f3de59fa>] sock_sendmsg+0x4c/0x60 [<0000000060474066>] ____sys_sendmsg+0x2c0/0x2f0 [<0000000011638d97>] ___sys_sendmsg+0x8a/0xd0 [<00000000c60a4471>] __sys_sendmsg+0x77/0xe0 [<0000000050fc693b>] do_syscall_64+0x6e/0x220 [<00000000d4ba07e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811c82e980 (size 32): comm "syz-executor429", pid 6681, jiffies 4294944429 (age 18.530s) hex dump (first 32 bytes): 00 a8 64 84 ff ff ff ff 60 9e b4 83 ff ff ff ff ..d.....`....... 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<00000000d4a6411c>] genl_rcv_msg+0x360/0x520 [<00000000ce1970c4>] netlink_rcv_skb+0x5a/0x180 [<0000000050e934dc>] genl_rcv+0x24/0x40 [<00000000ed0dca5b>] netlink_unicast+0x20a/0x2f0 [<00000000326f2b0b>] netlink_sendmsg+0x2b5/0x560 [<00000000f3de59fa>] sock_sendmsg+0x4c/0x60 [<0000000060474066>] ____sys_sendmsg+0x2c0/0x2f0 [<0000000011638d97>] ___sys_sendmsg+0x8a/0xd0 [<00000000c60a4471>] __sys_sendmsg+0x77/0xe0 [<0000000050fc693b>] do_syscall_64+0x6e/0x220 [<00000000d4ba07e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9