[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. syzkaller login: [ 51.269129][ T25] audit: type=1400 audit(1590397956.875:8): avc: denied { execmem } for pid=6618 comm="syz-executor249" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program [ 58.743321][ T6621] netlink: 4 bytes leftover after parsing attributes in process `syz-executor249'. executing program [ 64.439971][ T6624] netlink: 4 bytes leftover after parsing attributes in process `syz-executor249'. [ 65.747766][ T6618] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811c962a00 (size 32): comm "syz-executor249", pid 6621, jiffies 4294943144 (age 15.050s) hex dump (first 32 bytes): 00 a9 64 84 ff ff ff ff c8 a1 b4 83 ff ff ff ff ..d............. 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 ff ff ........_t:s0... backtrace: [<00000000ace106d6>] genl_rcv_msg+0x360/0x520 [<0000000084a415a7>] netlink_rcv_skb+0x5a/0x180 [<00000000374e8339>] genl_rcv+0x24/0x40 [<000000003e7894a2>] netlink_unicast+0x20a/0x2f0 [<00000000a350b958>] netlink_sendmsg+0x2b5/0x560 [<000000009e2bdce3>] sock_sendmsg+0x4c/0x60 [<0000000007d85cf9>] sock_no_sendpage+0x8c/0xb0 [<000000005728faa6>] kernel_sendpage+0x45/0x80 [<00000000b7c7b880>] sock_sendpage+0x40/0x50 [<0000000029de857e>] pipe_to_sendpage+0x87/0xe0 [<00000000475e28e0>] __splice_from_pipe+0x14a/0x250 [<00000000a33b1874>] splice_from_pipe+0x70/0xb0 [<0000000092065f00>] do_splice+0x38b/0x780 [<000000001bc4cca3>] __x64_sys_splice+0xaa/0x110 [<00000000aaab2869>] do_syscall_64+0x6e/0x220 [<00000000f3c10d0e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9