[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.26' (ECDSA) to the list of known hosts. syzkaller login: [ 54.060284][ T25] audit: type=1400 audit(1591444642.549:8): avc: denied { execmem } for pid=6429 comm="syz-executor533" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program [ 83.456816][ T6429] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888118dd5680 (size 64): comm "syz-executor533", pid 6431, jiffies 4294943961 (age 18.920s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ c0 87 56 84 ff ff ff ff 00 00 00 00 00 00 00 00 ..V............. backtrace: [<00000000478918a0>] crypto_create_tfm+0x31/0x100 [<0000000013379d42>] crypto_alloc_tfm+0x79/0x1a0 [<0000000094b14ccf>] drbg_kcapi_seed+0x432/0x6a9 [<00000000dda926da>] crypto_rng_reset+0x35/0x1a0 [<00000000a7f3c22f>] alg_setsockopt+0x149/0x190 [<00000000485ffd44>] __sys_setsockopt+0x112/0x230 [<000000004d7642be>] __x64_sys_setsockopt+0x22/0x30 [<00000000ed05afed>] do_syscall_64+0x6e/0x220 [<00000000e12e25c3>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881197eb300 (size 96): comm "syz-executor533", pid 6431, jiffies 4294943961 (age 18.920s) hex dump (first 32 bytes): a0 30 34 52 68 6a 79 66 00 00 00 00 00 00 00 00 .04Rhjyf........ d4 e8 bf f4 24 00 00 00 f8 67 00 00 00 00 00 00 ....$....g...... backtrace: [<0000000072105d19>] jent_entropy_collector_alloc+0x1b/0xf8 [<00000000aa84b81d>] jent_kcapi_init+0x17/0x40 [<00000000e26751c0>] crypto_create_tfm+0x89/0x100 [<0000000013379d42>] crypto_alloc_tfm+0x79/0x1a0 [<0000000094b14ccf>] drbg_kcapi_seed+0x432/0x6a9 [<00000000dda926da>] crypto_rng_reset+0x35/0x1a0 [<00000000a7f3c22f>] alg_setsockopt+0x149/0x190 [<00000000485ffd44>] __sys_setsockopt+0x112/0x230 [<000000004d7642be>] __x64_sys_setsockopt+0x22/0x30 [<00000000ed05afed>] do_syscall_64+0x6e/0x220 [<00000000e12e25c3>] entry_SYSCALL_64_after_hwframe+0x44/0xa9