[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.71' (ECDSA) to the list of known hosts. syzkaller login: [ 137.356965][ T26] audit: type=1400 audit(1596197515.538:8): avc: denied { execmem } for pid=6424 comm="syz-executor207" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program executing program [ 144.685872][ T6429] FS-Cache: Duplicate cookie detected [ 144.691321][ T6429] FS-Cache: O-cookie c=00000000d38e7b5e [p=00000000b4fff989 fl=222 nc=0 na=1] [ 144.696661][ T6438] FS-Cache: Duplicate cookie detected [ 144.700159][ T6429] FS-Cache: O-cookie d=00000000927452cb n=000000005c9a3152 [ 144.705497][ T6438] FS-Cache: O-cookie c=000000008ebc99ab [p=00000000b4fff989 fl=222 nc=0 na=1] [ 144.712656][ T6429] FS-Cache: O-key=[10] '34323934393531373337' [ 144.721471][ T6438] FS-Cache: O-cookie d=00000000927452cb n=00000000578e0d29 executing program executing program [ 144.721473][ T6438] FS-Cache: O-key=[10] '34323934393531373338' [ 144.727513][ T6429] FS-Cache: N-cookie c=0000000048bda26d [p=00000000b4fff989 fl=2 nc=0 na=1] [ 144.734669][ T6438] FS-Cache: N-cookie c=00000000620e3335 [p=00000000b4fff989 fl=2 nc=0 na=1] [ 144.740703][ T6429] FS-Cache: N-cookie d=00000000927452cb n=000000007d624e21 [ 144.740705][ T6429] FS-Cache: N-key=[10] '34323934393531373337' [ 144.749350][ T6438] FS-Cache: N-cookie d=00000000927452cb n=00000000f7474451 [ 144.749352][ T6438] FS-Cache: N-key=[10] '34323934393531373338' [ 144.765505][ T6443] FS-Cache: Duplicate cookie detected [ 144.774176][ T6435] FS-Cache: Duplicate cookie detected [ 144.778413][ T6443] FS-Cache: O-cookie c=000000002d25eb74 [p=00000000b4fff989 fl=222 nc=0 na=1] [ 144.778418][ T6443] FS-Cache: O-cookie d=00000000927452cb n=0000000042ae434d [ 144.784456][ T6435] FS-Cache: O-cookie c=00000000d38e7b5e [p=00000000b4fff989 fl=222 nc=0 na=1] [ 144.789793][ T6443] FS-Cache: O-key=[10] '34323934393531373435' [ 144.795131][ T6435] FS-Cache: O-cookie d=00000000927452cb n=000000005c9a3152 executing program [ 144.803949][ T6443] FS-Cache: N-cookie c=00000000a676de11 [p=00000000b4fff989 fl=2 nc=0 na=1] [ 144.811107][ T6435] FS-Cache: O-key=[10] '34323934393531373337' [ 144.819920][ T6443] FS-Cache: N-cookie d=00000000927452cb n=00000000c05eef89 [ 144.825951][ T6435] FS-Cache: N-cookie c=000000009cfeba06 [p=00000000b4fff989 fl=2 nc=0 na=1] [ 144.825954][ T6435] FS-Cache: N-cookie d=00000000927452cb n=000000001dc02cbc [ 144.825958][ T6435] FS-Cache: N-key=[10] '34323934393531373337' [ 144.833114][ T6443] FS-Cache: N-key=[10] '34323934393531373435' [ 151.730602][ T6428] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811e88e520 (size 32): comm "syz-executor207", pid 6429, jiffies 4294951737 (age 20.950s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 6c 69 6e 75 78 4294951737.linux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 [<00000000e7658a46>] v9fs_mount+0x56/0x390 [<0000000067417a84>] legacy_get_tree+0x26/0x70 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 [<000000005a8900e5>] do_mount+0xa63/0xe40 [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179da140 (size 32): comm "syz-executor207", pid 6435, jiffies 4294951737 (age 20.950s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 00 20 00 00 00 4294951737.. ... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 [<00000000e7658a46>] v9fs_mount+0x56/0x390 [<0000000067417a84>] legacy_get_tree+0x26/0x70 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 [<000000005a8900e5>] do_mount+0xa63/0xe40 [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e88e520 (size 32): comm "syz-executor207", pid 6429, jiffies 4294951737 (age 24.390s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 6c 69 6e 75 78 4294951737.linux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 [<00000000e7658a46>] v9fs_mount+0x56/0x390 [<0000000067417a84>] legacy_get_tree+0x26/0x70 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 [<000000005a8900e5>] do_mount+0xa63/0xe40 [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179da140 (size 32): comm "syz-executor207", pid 6435, jiffies 4294951737 (age 24.390s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 00 20 00 00 00 4294951737.. ... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 [<00000000e7658a46>] v9fs_mount+0x56/0x390 [<0000000067417a84>] legacy_get_tree+0x26/0x70 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 [<000000005a8900e5>] do_mount+0xa63/0xe40 [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e88e520 (size 32): comm "syz-executor207", pid 6429, jiffies 4294951737 (age 25.600s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 6c 69 6e 75 78 4294951737.linux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 [<00000000e7658a46>] v9fs_mount+0x56/0x390 [<0000000067417a84>] legacy_get_tree+0x26/0x70 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 [<000000005a8900e5>] do_mount+0xa63/0xe40 [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179da140 (size 32): comm "syz-executor207", pid 6435, jiffies 4294951737 (age 25.600s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 00 20 00 00 00 4294951737.. ... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 [<00000000e7658a46>] v9fs_mount+0x56/0x390 [<0000000067417a84>] legacy_get_tree+0x26/0x70 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 [<000000005a8900e5>] do_mount+0xa63/0xe40 [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e88e520 (size 32): comm "syz-executor207", pid 6429, jiffies 4294951737 (age 26.790s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 6c 69 6e 75 78 4294951737.linux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 [<00000000e7658a46>] v9fs_mount+0x56/0x390 [<0000000067417a84>] legacy_get_tree+0x26/0x70 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 [<000000005a8900e5>] do_mount+0xa63/0xe40 [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179da140 (size 32): comm "syz-executor207", pid 6435, jiffies 4294951737 (age 26.790s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 00 20 00 00 00 4294951737.. ... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 [<00000000e7658a46>] v9fs_mount+0x56/0x390 [<0000000067417a84>] legacy_get_tree+0x26/0x70 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 [<000000005a8900e5>] do_mount+0xa63/0xe40 [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e88e520 (size 32): comm "syz-executor207", pid 6429, jiffies 4294951737 (age 27.990s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 6c 69 6e 75 78 4294951737.linux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 [<00000000e7658a46>] v9fs_mount+0x56/0x390 [<0000000067417a84>] legacy_get_tree+0x26/0x70 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 [<000000005a8900e5>] do_mount+0xa63/0xe40 [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179da140 (size 32): comm "syz-executor207", pid 6435, jiffies 4294951737 (age 27.990s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 00 20 00 00 00 4294951737.. ... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 [<00000000e7658a46>] v9fs_mount+0x56/0x390 [<0000000067417a84>] legacy_get_tree+0x26/0x70 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 [<000000005a8900e5>] do_mount+0xa63/0xe40 [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program executing program