[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.169' (ECDSA) to the list of known hosts. executing program executing program executing program syzkaller login: [ 63.173762][ T8479] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 70.133662][ T8479] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810f6cd500 (size 232): comm "syz-executor323", pid 8481, jiffies 4294942887 (age 14.030s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 d0 1b 01 81 88 ff ff 40 a0 27 08 81 88 ff ff ........@.'..... backtrace: [<00000000f4886dc4>] __alloc_skb+0x6d/0x280 [<0000000050aff726>] sctp_packet_transmit+0x117/0xcb0 [<000000001246ebcb>] sctp_outq_flush+0x121/0xcc0 [<000000006a2e9a6f>] sctp_do_sm+0x1cd3/0x2370 [<0000000059725376>] sctp_assoc_bh_rcv+0x1e3/0x300 [<000000009550011c>] sctp_inq_push+0x93/0xc0 [<000000008ce67cb7>] sctp_backlog_rcv+0xa2/0x4b0 [<00000000b4651756>] __release_sock+0xc1/0x140 [<000000005f8e38ed>] release_sock+0x32/0xd0 [<000000004be205f9>] sctp_wait_for_connect+0xd2/0x290 [<000000005fd3b269>] sctp_sendmsg_to_asoc+0xd01/0xd20 [<0000000062938b6d>] sctp_sendmsg+0x992/0x1030 [<0000000052aa3621>] inet_sendmsg+0x45/0x70 [<000000002e6e3cc2>] sock_sendmsg+0x56/0x80 [<000000005d063042>] __sys_sendto+0x15c/0x200 [<00000000ff0cff95>] __x64_sys_sendto+0x26/0x30 BUG: memory leak unreferenced object 0xffff8881102a8400 (size 1024): comm "syz-executor323", pid 8481, jiffies 4294942887 (age 14.030s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000906781ee>] __alloc_skb+0xab/0x280 [<0000000050aff726>] sctp_packet_transmit+0x117/0xcb0 [<000000001246ebcb>] sctp_outq_flush+0x121/0xcc0 [<000000006a2e9a6f>] sctp_do_sm+0x1cd3/0x2370 [<0000000059725376>] sctp_assoc_bh_rcv+0x1e3/0x300 [<000000009550011c>] sctp_inq_push+0x93/0xc0 [<000000008ce67cb7>] sctp_backlog_rcv+0xa2/0x4b0 [<00000000b4651756>] __release_sock+0xc1/0x140 [<000000005f8e38ed>] release_sock+0x32/0xd0 [<000000004be205f9>] sctp_wait_for_connect+0xd2/0x290 [<000000005fd3b269>] sctp_sendmsg_to_asoc+0xd01/0xd20 [<0000000062938b6d>] sctp_sendmsg+0x992/0x1030 [<0000000052aa3621>] inet_sendmsg+0x45/0x70 [<000000002e6e3cc2>] sock_sendmsg+0x56/0x80 [<000000005d063042>] __sys_sendto+0x15c/0x200 [<00000000ff0cff95>] __x64_sys_sendto+0x26/0x30 BUG: memory leak unreferenced object 0xffff88810f55e600 (size 232): comm "syz-executor323", pid 8482, jiffies 4294943494 (age 7.960s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 d0 1b 01 81 88 ff ff 40 a0 27 08 81 88 ff ff ........@.'..... backtrace: [<00000000f4886dc4>] __alloc_skb+0x6d/0x280 [<0000000050aff726>] sctp_packet_transmit+0x117/0xcb0 [<000000001246ebcb>] sctp_outq_flush+0x121/0xcc0 [<000000006a2e9a6f>] sctp_do_sm+0x1cd3/0x2370 [<0000000059725376>] sctp_assoc_bh_rcv+0x1e3/0x300 [<000000009550011c>] sctp_inq_push+0x93/0xc0 [<000000008ce67cb7>] sctp_backlog_rcv+0xa2/0x4b0 [<00000000b4651756>] __release_sock+0xc1/0x140 [<000000005f8e38ed>] release_sock+0x32/0xd0 [<000000004be205f9>] sctp_wait_for_connect+0xd2/0x290 [<000000005fd3b269>] sctp_sendmsg_to_asoc+0xd01/0xd20 [<0000000062938b6d>] sctp_sendmsg+0x992/0x1030 [<0000000052aa3621>] inet_sendmsg+0x45/0x70 [<000000002e6e3cc2>] sock_sendmsg+0x56/0x80 [<000000005d063042>] __sys_sendto+0x15c/0x200 [<00000000ff0cff95>] __x64_sys_sendto+0x26/0x30