[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.249' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 49.060662][ T8423] IPVS: ftp: loaded support on port[0] = 21 [ 55.364079][ T8423] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810153d300 (size 168): comm "kworker/u4:5", pid 3337, jiffies 4294942178 (age 8.380s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000fadae063>] prepare_creds+0x27/0x410 [<00000000f4b712f2>] copy_creds+0x3a/0x230 [<000000009664f26a>] copy_process+0x6a3/0x25c0 [<0000000095deb8f1>] kernel_clone+0xf3/0x670 [<000000009cfaa552>] kernel_thread+0x61/0x80 [<00000000224e087e>] call_usermodehelper_exec_work+0xc4/0x120 [<00000000e65b03c7>] process_one_work+0x2c9/0x600 [<000000004fe61903>] worker_thread+0x59/0x5d0 [<00000000a8044f9f>] kthread+0x178/0x1b0 [<000000009ba91e5f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff8881132fc8e0 (size 32): comm "kworker/u4:5", pid 3337, jiffies 4294942178 (age 8.380s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000802b960a>] security_prepare_creds+0x9f/0xc0 [<00000000b1358a81>] prepare_creds+0x2c7/0x410 [<00000000f4b712f2>] copy_creds+0x3a/0x230 [<000000009664f26a>] copy_process+0x6a3/0x25c0 [<0000000095deb8f1>] kernel_clone+0xf3/0x670 [<000000009cfaa552>] kernel_thread+0x61/0x80 [<00000000224e087e>] call_usermodehelper_exec_work+0xc4/0x120 [<00000000e65b03c7>] process_one_work+0x2c9/0x600 [<000000004fe61903>] worker_thread+0x59/0x5d0 [<00000000a8044f9f>] kthread+0x178/0x1b0 [<000000009ba91e5f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff888110c74d00 (size 232): comm "kworker/u4:5", pid 8448, jiffies 4294942178 (age 8.380s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 47 04 01 81 88 ff ff 00 df bc 0f 81 88 ff ff .G.............. backtrace: [<00000000c5c45f82>] __alloc_file+0x1f/0xf0 [<00000000c983ee17>] alloc_empty_file+0x69/0x120 [<000000009244bbde>] alloc_file+0x33/0x1b0 [<00000000cfc99561>] alloc_file_pseudo+0xb2/0x140 [<00000000c87c5cd3>] create_pipe_files+0x138/0x2e0 [<000000005e8b4874>] umd_setup+0x33/0x220 [<0000000006668e98>] call_usermodehelper_exec_async+0xb4/0x1b0 [<000000009ba91e5f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff888110c3cdc8 (size 24): comm "kworker/u4:5", pid 8448, jiffies 4294942178 (age 8.380s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 b0 8e 93 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 ........ backtrace: [<00000000d8431c2e>] security_file_alloc+0x2a/0xb0 [<0000000049a90543>] __alloc_file+0x5d/0xf0 [<00000000c983ee17>] alloc_empty_file+0x69/0x120 [<000000009244bbde>] alloc_file+0x33/0x1b0 [<00000000cfc99561>] alloc_file_pseudo+0xb2/0x140 [<00000000c87c5cd3>] create_pipe_files+0x138/0x2e0 [<000000005e8b4874>] umd_setup+0x33/0x220 [<0000000006668e98>] call_usermodehelper_exec_async+0xb4/0x1b0 [<000000009ba91e5f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810f942a00 (size 608): comm "kworker/u4:5", pid 8448, jiffies 4294942178 (age 8.380s) hex dump (first 32 bytes): 80 11 04 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ backtrace: [<000000002d7aaa6a>] alloc_inode+0xbe/0x100 [<0000000008156b27>] new_inode_pseudo+0x13/0x70 [<000000003c5cd2f8>] create_pipe_files+0x2b/0x2e0 [<000000002a49a38e>] umd_setup+0xad/0x220 [<0000000006668e98>] call_usermodehelper_exec_async+0xb4/0x1b0 [<000000009ba91e5f>] ret_from_fork+0x1f/0x30