[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.19' (ECDSA) to the list of known hosts. syzkaller login: [ 58.496003][ T26] audit: type=1400 audit(1596381430.156:8): avc: denied { execmem } for pid=6430 comm="syz-executor493" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program [ 80.467665][ T6430] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 87.334247][ T6430] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888128d25800 (size 1024): comm "syz-executor493", pid 6464, jiffies 4294944570 (age 14.450s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ee9fd51f>] veth_dev_init+0x7b/0x120 [<00000000ea2b9ca8>] register_netdevice+0x143/0x760 [<0000000054f736e0>] veth_newlink+0x282/0x460 [<0000000048b625cf>] __rtnl_newlink+0x8f0/0xbc0 [<00000000c7111fa7>] rtnl_newlink+0x49/0x70 [<000000003c581d51>] rtnetlink_rcv_msg+0x17e/0x460 [<0000000044c6a9c9>] netlink_rcv_skb+0x5b/0x180 [<00000000c5e8a749>] netlink_unicast+0x2b6/0x3c0 [<000000000417c80d>] netlink_sendmsg+0x2ba/0x570 [<000000000bc3c36b>] sock_sendmsg+0x4c/0x60 [<0000000041ecdda4>] ____sys_sendmsg+0x2c4/0x2f0 [<0000000013875e8e>] ___sys_sendmsg+0x81/0xc0 [<00000000ab05eaa1>] __sys_sendmsg+0x77/0xe0 [<00000000475b439b>] do_syscall_64+0x4c/0xe0 [<00000000dbda4b6d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119669c00 (size 1024): comm "syz-executor493", pid 6496, jiffies 4294945171 (age 8.440s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ee9fd51f>] veth_dev_init+0x7b/0x120 [<00000000ea2b9ca8>] register_netdevice+0x143/0x760 [<0000000054f736e0>] veth_newlink+0x282/0x460 [<0000000048b625cf>] __rtnl_newlink+0x8f0/0xbc0 [<00000000c7111fa7>] rtnl_newlink+0x49/0x70 [<000000003c581d51>] rtnetlink_rcv_msg+0x17e/0x460 [<0000000044c6a9c9>] netlink_rcv_skb+0x5b/0x180 [<00000000c5e8a749>] netlink_unicast+0x2b6/0x3c0 [<000000000417c80d>] netlink_sendmsg+0x2ba/0x570 [<000000000bc3c36b>] sock_sendmsg+0x4c/0x60 [<0000000041ecdda4>] ____sys_sendmsg+0x2c4/0x2f0 [<0000000013875e8e>] ___sys_sendmsg+0x81/0xc0 [<00000000ab05eaa1>] __sys_sendmsg+0x77/0xe0 [<00000000475b439b>] do_syscall_64+0x4c/0xe0 [<00000000dbda4b6d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9