[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 35.417980][ T8209] sshd (8209) used greatest stack depth: 10896 bytes left Warning: Permanently added '10.128.0.102' (ECDSA) to the list of known hosts. executing program [ 50.842386][ T8451] IPVS: ftp: loaded support on port[0] = 21 executing program [ 56.784797][ T8473] IPVS: ftp: loaded support on port[0] = 21 [ 57.734591][ T8450] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 64.604165][ T8450] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810fff5d00 (size 256): comm "syz-executor008", pid 8451, jiffies 4294942354 (age 13.820s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 0a 00 00 00 00 00 06 0f 81 88 ff ff ................ backtrace: [<000000008cba9ac0>] rxrpc_lookup_local+0x1c1/0x760 [<000000004574f077>] rxrpc_bind+0x174/0x240 [<00000000d476e492>] afs_open_socket+0xdb/0x200 [<00000000499a9e87>] afs_net_init+0x2b4/0x340 [<00000000b0fa6b89>] ops_init+0x4e/0x190 [<00000000cb1542f5>] setup_net+0xde/0x2d0 [<00000000c7d6ffb1>] copy_net_ns+0x19f/0x3e0 [<000000001ef1337f>] create_new_namespaces+0x199/0x4f0 [<00000000cc62aa8a>] copy_namespaces+0xd7/0x140 [<000000000359a213>] copy_process+0x1360/0x25c0 [<00000000e00f25f1>] kernel_clone+0xf3/0x670 [<000000006b0ce461>] __do_sys_clone+0x76/0xa0 [<0000000031acb3f4>] do_syscall_64+0x2d/0x70 [<00000000940e70cb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811129a600 (size 256): comm "syz-executor008", pid 8473, jiffies 4294942948 (age 7.880s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 0a 00 00 00 00 00 06 0f 81 88 ff ff ................ backtrace: [<000000008cba9ac0>] rxrpc_lookup_local+0x1c1/0x760 [<000000004574f077>] rxrpc_bind+0x174/0x240 [<00000000d476e492>] afs_open_socket+0xdb/0x200 [<00000000499a9e87>] afs_net_init+0x2b4/0x340 [<00000000b0fa6b89>] ops_init+0x4e/0x190 [<00000000cb1542f5>] setup_net+0xde/0x2d0 [<00000000c7d6ffb1>] copy_net_ns+0x19f/0x3e0 [<000000001ef1337f>] create_new_namespaces+0x199/0x4f0 [<00000000cc62aa8a>] copy_namespaces+0xd7/0x140 [<000000000359a213>] copy_process+0x1360/0x25c0 [<00000000e00f25f1>] kernel_clone+0xf3/0x670 [<000000006b0ce461>] __do_sys_clone+0x76/0xa0 [<0000000031acb3f4>] do_syscall_64+0x2d/0x70 [<00000000940e70cb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9