[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 85.211215][ T8483] IPVS: ftp: loaded support on port[0] = 21 executing program executing program executing program [ 107.426248][ T8483] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 109.726024][ T8483] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810e85adc0 (size 1728): comm "syz-executor376", pid 8506, jiffies 4294946899 (age 13.430s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000cb2829d9>] sk_prot_alloc+0x3e/0x1c0 [<0000000023bd8ef8>] sk_alloc+0x30/0x3f0 [<00000000a4a7ed0a>] inet_create+0x16a/0x560 [<000000003b729101>] __sock_create+0x1ab/0x2b0 [<00000000ebee6fd5>] __sys_socket+0x6f/0x140 [<00000000bcf20e68>] __x64_sys_socket+0x1a/0x20 [<00000000732fe45a>] do_syscall_64+0x2d/0x70 [<0000000091e76b15>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810fec3c80 (size 768): comm "syz-executor376", pid 8506, jiffies 4294946899 (age 13.430s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 c0 72 a0 0e 81 88 ff ff .........r...... backtrace: [<00000000681cd6ae>] sock_alloc_inode+0x18/0x90 [<00000000fa9d2004>] alloc_inode+0x27/0x100 [<00000000f3a018c7>] new_inode_pseudo+0x13/0x70 [<00000000549f715a>] sock_alloc+0x18/0x90 [<00000000a044e0d4>] __sock_create+0xb8/0x2b0 [<00000000973ca39c>] mptcp_subflow_create_socket+0x57/0x280 [<00000000a3724864>] mptcp_init_sock+0x12f/0x270 [<00000000c97baf32>] inet_create+0x2ed/0x560 [<000000003b729101>] __sock_create+0x1ab/0x2b0 [<00000000ebee6fd5>] __sys_socket+0x6f/0x140 [<00000000bcf20e68>] __x64_sys_socket+0x1a/0x20 [<00000000732fe45a>] do_syscall_64+0x2d/0x70 [<0000000091e76b15>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810de87bb8 (size 24): comm "syz-executor376", pid 8506, jiffies 4294946899 (age 13.430s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 ........ backtrace: [<00000000bea9ec8c>] security_inode_alloc+0x2a/0xb0 [<00000000543365c5>] inode_init_always+0x10c/0x250 [<000000004da5c777>] alloc_inode+0x44/0x100 [<00000000f3a018c7>] new_inode_pseudo+0x13/0x70 [<00000000549f715a>] sock_alloc+0x18/0x90 [<00000000a044e0d4>] __sock_create+0xb8/0x2b0 [<00000000973ca39c>] mptcp_subflow_create_socket+0x57/0x280 [<00000000a3724864>] mptcp_init_sock+0x12f/0x270 [<00000000c97baf32>] inet_create+0x2ed/0x560 [<000000003b729101>] __sock_create+0x1ab/0x2b0 [<00000000ebee6fd5>] __sys_socket+0x6f/0x140 [<00000000bcf20e68>] __x64_sys_socket+0x1a/0x20 [<00000000732fe45a>] do_syscall_64+0x2d/0x70 [<0000000091e76b15>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810ea072c0 (size 2208): comm "syz-executor376", pid 8506, jiffies 4294946899 (age 13.430s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000cb2829d9>] sk_prot_alloc+0x3e/0x1c0 [<0000000023bd8ef8>] sk_alloc+0x30/0x3f0 [<00000000a4a7ed0a>] inet_create+0x16a/0x560 [<000000003b729101>] __sock_create+0x1ab/0x2b0 [<00000000973ca39c>] mptcp_subflow_create_socket+0x57/0x280 [<00000000a3724864>] mptcp_init_sock+0x12f/0x270 [<00000000c97baf32>] inet_create+0x2ed/0x560 [<000000003b729101>] __sock_create+0x1ab/0x2b0 [<00000000ebee6fd5>] __sys_socket+0x6f/0x140 [<00000000bcf20e68>] __x64_sys_socket+0x1a/0x20 [<00000000732fe45a>] do_syscall_64+0x2d/0x70 [<0000000091e76b15>] entry_SYSCALL_64_after_hwframe+0x44/0xa9