[ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.42' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 49.423253][ T8475] IPVS: ftp: loaded support on port[0] = 21 executing program [ 55.989323][ T8475] kmemleak: 60 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888109f23b00 (size 256): comm "syz-executor894", pid 8496, jiffies 4294942216 (age 13.000s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000034ccec54>] tcindex_set_parms+0xa3/0xba0 [<00000000b2192f90>] tcindex_change+0xe8/0x120 [<0000000024c166e5>] tc_new_tfilter+0xa33/0x1030 [<00000000461c803a>] rtnetlink_rcv_msg+0x422/0x520 [<0000000083853b15>] netlink_rcv_skb+0x87/0x1d0 [<000000000e31aa54>] netlink_unicast+0x392/0x4c0 [<0000000009bbc480>] netlink_sendmsg+0x368/0x6a0 [<000000006b5c52da>] sock_sendmsg+0x56/0x80 [<000000007ce28f8d>] ____sys_sendmsg+0x17a/0x390 [<00000000536755ab>] ___sys_sendmsg+0x8b/0xd0 [<00000000d863d072>] __sys_sendmmsg+0xed/0x290 [<00000000081bdef9>] __x64_sys_sendmmsg+0x24/0x30 [<00000000c633b7ed>] do_syscall_64+0x2d/0x70 [<00000000d7c4d7b9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810c205800 (size 256): comm "syz-executor894", pid 8496, jiffies 4294942216 (age 13.000s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000b240ba6d>] tcindex_alloc_perfect_hash+0x8f/0x140 [<000000004c799203>] tcindex_set_parms+0xa49/0xba0 [<00000000b2192f90>] tcindex_change+0xe8/0x120 [<0000000024c166e5>] tc_new_tfilter+0xa33/0x1030 [<00000000461c803a>] rtnetlink_rcv_msg+0x422/0x520 [<0000000083853b15>] netlink_rcv_skb+0x87/0x1d0 [<000000000e31aa54>] netlink_unicast+0x392/0x4c0 [<0000000009bbc480>] netlink_sendmsg+0x368/0x6a0 [<000000006b5c52da>] sock_sendmsg+0x56/0x80 [<000000007ce28f8d>] ____sys_sendmsg+0x17a/0x390 [<00000000536755ab>] ___sys_sendmsg+0x8b/0xd0 [<00000000d863d072>] __sys_sendmmsg+0xed/0x290 [<00000000081bdef9>] __x64_sys_sendmmsg+0x24/0x30 [<00000000c633b7ed>] do_syscall_64+0x2d/0x70 [<00000000d7c4d7b9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810c205700 (size 256): comm "syz-executor894", pid 8496, jiffies 4294942216 (age 13.000s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000b240ba6d>] tcindex_alloc_perfect_hash+0x8f/0x140 [<000000004c799203>] tcindex_set_parms+0xa49/0xba0 [<00000000b2192f90>] tcindex_change+0xe8/0x120 [<0000000024c166e5>] tc_new_tfilter+0xa33/0x1030 [<00000000461c803a>] rtnetlink_rcv_msg+0x422/0x520 [<0000000083853b15>] netlink_rcv_skb+0x87/0x1d0 [<000000000e31aa54>] netlink_unicast+0x392/0x4c0 [<0000000009bbc480>] netlink_sendmsg+0x368/0x6a0 [<000000006b5c52da>] sock_sendmsg+0x56/0x80 [<000000007ce28f8d>] ____sys_sendmsg+0x17a/0x390 [<00000000536755ab>] ___sys_sendmsg+0x8b/0xd0 [<00000000d863d072>] __sys_sendmmsg+0xed/0x290 [<00000000081bdef9>] __x64_sys_sendmmsg+0x24/0x30 [<00000000c633b7ed>] do_syscall_64+0x2d/0x70 [<00000000d7c4d7b9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 62.370082][ T8475] kmemleak: 54 new suspected memory leaks (see /sys/kernel/debug/kmemleak)