[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.89' (ECDSA) to the list of known hosts. syzkaller login: [ 39.121905][ T25] audit: type=1400 audit(1591413597.639:8): avc: denied { execmem } for pid=6447 comm="syz-executor535" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program executing program executing program executing program [ 84.961527][ T6447] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888119adbfc0 (size 64): comm "syz-executor535", pid 6453, jiffies 4294944691 (age 13.150s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ c0 87 56 84 ff ff ff ff 00 00 00 00 00 00 00 00 ..V............. backtrace: [<00000000629da83a>] crypto_create_tfm+0x31/0x100 [<000000008673b749>] crypto_alloc_tfm+0x79/0x1a0 [<00000000fbd8cde8>] drbg_kcapi_seed+0x432/0x6a9 [<0000000083e6260c>] crypto_rng_reset+0x35/0x1a0 [<000000006304865c>] alg_setsockopt+0x149/0x190 [<000000005c99076d>] __sys_setsockopt+0x112/0x230 [<000000006c4e80d7>] __x64_sys_setsockopt+0x22/0x30 [<000000008a500f27>] do_syscall_64+0x6e/0x220 [<0000000065a55352>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119246180 (size 96): comm "syz-executor535", pid 6453, jiffies 4294944691 (age 13.150s) hex dump (first 32 bytes): 69 04 bf 9e 84 e1 4c 9a 00 00 00 00 00 00 00 00 i.....L......... b7 d5 e7 14 29 00 00 00 71 75 00 00 00 00 00 00 ....)...qu...... backtrace: [<00000000a92d3058>] jent_entropy_collector_alloc+0x1b/0xf8 [<000000001295f81b>] jent_kcapi_init+0x17/0x40 [<000000006a41b45f>] crypto_create_tfm+0x89/0x100 [<000000008673b749>] crypto_alloc_tfm+0x79/0x1a0 [<00000000fbd8cde8>] drbg_kcapi_seed+0x432/0x6a9 [<0000000083e6260c>] crypto_rng_reset+0x35/0x1a0 [<000000006304865c>] alg_setsockopt+0x149/0x190 [<000000005c99076d>] __sys_setsockopt+0x112/0x230 [<000000006c4e80d7>] __x64_sys_setsockopt+0x22/0x30 [<000000008a500f27>] do_syscall_64+0x6e/0x220 [<0000000065a55352>] entry_SYSCALL_64_after_hwframe+0x44/0xa9