[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.26' (ECDSA) to the list of known hosts. syzkaller login: [ 55.718279][ T25] audit: type=1400 audit(1588655877.011:8): avc: denied { execmem } for pid=6672 comm="syz-executor202" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program [ 79.012559][ T6672] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811641d7e0 (size 32): comm "syz-executor202", pid 6673, jiffies 4294943573 (age 18.340s) hex dump (first 32 bytes): 40 a8 64 84 ff ff ff ff 20 9f b4 83 ff ff ff ff @.d..... ....... 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<00000000563b334f>] genl_rcv_msg+0x360/0x520 [<00000000a5051a91>] netlink_rcv_skb+0x5a/0x180 [<000000004815c6f6>] genl_rcv+0x24/0x40 [<00000000113b21a1>] netlink_unicast+0x20a/0x2f0 [<00000000d8f13aaa>] netlink_sendmsg+0x2b5/0x560 [<00000000b789e260>] sock_sendmsg+0x4c/0x60 [<000000005b3ece85>] ____sys_sendmsg+0x2c0/0x2f0 [<000000003451dfd7>] ___sys_sendmsg+0x8a/0xd0 [<00000000bc1f8ee7>] __sys_sendmsg+0x77/0xe0 [<00000000cfe5a97e>] do_syscall_64+0x6e/0x220 [<00000000b9fc1b76>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811641d8e0 (size 32): comm "syz-executor202", pid 6674, jiffies 4294944111 (age 12.960s) hex dump (first 32 bytes): 40 a8 64 84 ff ff ff ff 20 9f b4 83 ff ff ff ff @.d..... ....... 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<00000000563b334f>] genl_rcv_msg+0x360/0x520 [<00000000a5051a91>] netlink_rcv_skb+0x5a/0x180 [<000000004815c6f6>] genl_rcv+0x24/0x40 [<00000000113b21a1>] netlink_unicast+0x20a/0x2f0 [<00000000d8f13aaa>] netlink_sendmsg+0x2b5/0x560 [<00000000b789e260>] sock_sendmsg+0x4c/0x60 [<000000005b3ece85>] ____sys_sendmsg+0x2c0/0x2f0 [<000000003451dfd7>] ___sys_sendmsg+0x8a/0xd0 [<00000000bc1f8ee7>] __sys_sendmsg+0x77/0xe0 [<00000000cfe5a97e>] do_syscall_64+0x6e/0x220 [<00000000b9fc1b76>] entry_SYSCALL_64_after_hwframe+0x44/0xa9