Warning: Permanently added '10.128.1.41' (ECDSA) to the list of known hosts. syzkaller login: [ 36.057838][ T25] audit: type=1400 audit(1591136680.858:8): avc: denied { execmem } for pid=6385 comm="syz-executor064" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 37.260344][ T6385] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) executing program executing program [ 54.384471][ T6385] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 56.750777][ T6385] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881175bc480 (size 64): comm "syz-executor064", pid 6388, jiffies 4294941622 (age 13.280s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 7e 56 84 ff ff ff ff 00 00 00 00 00 00 00 00 .~V............. backtrace: [<0000000029c7602f>] crypto_create_tfm+0x31/0x100 [<00000000bec8cbdb>] crypto_alloc_tfm+0x79/0x1a0 [<000000002f9791ba>] drbg_kcapi_seed+0x432/0x6a9 [<0000000041302bb8>] crypto_rng_reset+0x35/0x1a0 [<000000004758c3c4>] alg_setsockopt+0x149/0x190 [<000000008bc4b5cb>] __sys_setsockopt+0x112/0x230 [<00000000cfbf30da>] __x64_sys_setsockopt+0x22/0x30 [<00000000fc9c2183>] do_syscall_64+0x6e/0x220 [<0000000040e080a1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881175bc040 (size 64): comm "syz-executor064", pid 6389, jiffies 4294942172 (age 7.780s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 7e 56 84 ff ff ff ff 00 00 00 00 00 00 00 00 .~V............. backtrace: [<0000000029c7602f>] crypto_create_tfm+0x31/0x100 [<00000000bec8cbdb>] crypto_alloc_tfm+0x79/0x1a0 [<000000002f9791ba>] drbg_kcapi_seed+0x432/0x6a9 [<0000000041302bb8>] crypto_rng_reset+0x35/0x1a0 [<000000004758c3c4>] alg_setsockopt+0x149/0x190 [<000000008bc4b5cb>] __sys_setsockopt+0x112/0x230 [<00000000cfbf30da>] __x64_sys_setsockopt+0x22/0x30 [<00000000fc9c2183>] do_syscall_64+0x6e/0x220 [<0000000040e080a1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811b3ca080 (size 96): comm "syz-executor064", pid 6389, jiffies 4294942172 (age 7.780s) hex dump (first 32 bytes): 89 c7 08 cb 8a 12 10 6e 00 00 00 00 00 00 00 00 .......n........ 71 51 5a c2 1b 00 00 00 35 7d 00 00 00 00 00 00 qQZ.....5}...... backtrace: [<000000008ec3eca0>] jent_entropy_collector_alloc+0x1b/0xf8 [<0000000026ed401a>] jent_kcapi_init+0x17/0x40 [<00000000be7d6b06>] crypto_create_tfm+0x89/0x100 [<00000000bec8cbdb>] crypto_alloc_tfm+0x79/0x1a0 [<000000002f9791ba>] drbg_kcapi_seed+0x432/0x6a9 [<0000000041302bb8>] crypto_rng_reset+0x35/0x1a0 [<000000004758c3c4>] alg_setsockopt+0x149/0x190 [<000000008bc4b5cb>] __sys_setsockopt+0x112/0x230 [<00000000cfbf30da>] __x64_sys_setsockopt+0x22/0x30 [<00000000fc9c2183>] do_syscall_64+0x6e/0x220 [<0000000040e080a1>] entry_SYSCALL_64_after_hwframe+0x44/0xa9