[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.249' (ECDSA) to the list of known hosts. syzkaller login: [ 50.697266][ T26] audit: type=1400 audit(1591410613.698:8): avc: denied { execmem } for pid=6500 comm="syz-executor337" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program [ 65.126032][ T6500] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888118188740 (size 64): comm "syz-executor337", pid 6501, jiffies 4294943093 (age 14.560s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ c0 87 56 84 ff ff ff ff 00 00 00 00 00 00 00 00 ..V............. backtrace: [<000000004385efb5>] crypto_create_tfm+0x31/0x100 [<00000000f577c9d4>] crypto_alloc_tfm+0x79/0x1a0 [<00000000a0d097b9>] drbg_kcapi_seed+0x432/0x6a9 [<000000003a232085>] crypto_rng_reset+0x35/0x1a0 [<00000000a050fa1c>] alg_setsockopt+0x149/0x190 [<00000000febcae5e>] __sys_setsockopt+0x112/0x230 [<00000000ab5debf9>] __x64_sys_setsockopt+0x22/0x30 [<00000000c68e0f63>] do_syscall_64+0x6e/0x220 [<000000008059b693>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881171a2380 (size 96): comm "syz-executor337", pid 6501, jiffies 4294943093 (age 14.560s) hex dump (first 32 bytes): c4 78 a8 42 a3 f5 22 c4 00 00 00 00 00 00 00 00 .x.B.."......... a5 5e 9a 4e 20 00 00 00 1b 5c 00 00 00 00 00 00 .^.N ....\...... backtrace: [<000000002a50c3fa>] jent_entropy_collector_alloc+0x1b/0xf8 [<000000009e0528a6>] jent_kcapi_init+0x17/0x40 [<00000000ae845d60>] crypto_create_tfm+0x89/0x100 [<00000000f577c9d4>] crypto_alloc_tfm+0x79/0x1a0 [<00000000a0d097b9>] drbg_kcapi_seed+0x432/0x6a9 [<000000003a232085>] crypto_rng_reset+0x35/0x1a0 [<00000000a050fa1c>] alg_setsockopt+0x149/0x190 [<00000000febcae5e>] __sys_setsockopt+0x112/0x230 [<00000000ab5debf9>] __x64_sys_setsockopt+0x22/0x30 [<00000000c68e0f63>] do_syscall_64+0x6e/0x220 [<000000008059b693>] entry_SYSCALL_64_after_hwframe+0x44/0xa9