Warning: Permanently added '10.128.0.45' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 51.862810][ T8467] NILFS (loop0): broken superblock, retrying with spare superblock (blocksize = 1024) [ 51.872578][ T8467] NILFS (loop0): broken superblock, retrying with spare superblock (blocksize = 2048) [ 51.882556][ T8467] NILFS (loop0): mounting unchecked fs [ 51.888681][ T8467] NILFS (loop0): invalid segment: Magic number mismatch [ 51.895670][ T8467] NILFS (loop0): unable to fall back to spare super block [ 51.902976][ T8467] NILFS (loop0): error -22 while searching super root executing program [ 57.069645][ T8472] NILFS (loop0): broken superblock, retrying with spare superblock (blocksize = 1024) [ 57.079391][ T8472] NILFS (loop0): broken superblock, retrying with spare superblock (blocksize = 2048) [ 57.089509][ T8472] NILFS (loop0): mounting unchecked fs [ 57.095483][ T8472] NILFS (loop0): invalid segment: Magic number mismatch [ 57.102585][ T8472] NILFS (loop0): unable to fall back to spare super block [ 57.109977][ T8472] NILFS (loop0): error -22 while searching super root [ 58.138870][ T8466] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810cd7c540 (size 32): comm "syz-executor331", pid 8467, jiffies 4294942461 (age 12.430s) hex dump (first 32 bytes): 6c 6f 6f 70 30 00 00 00 00 00 00 00 00 00 00 00 loop0........... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f91c8bfa>] kstrdup+0x36/0x70 [<000000008d787d9b>] kstrdup_const+0x53/0x80 [<000000004f484cb8>] kvasprintf_const+0xc2/0x110 [<0000000028657f3e>] kobject_set_name_vargs+0x3b/0xe0 [<00000000dc292f96>] kobject_init_and_add+0x6d/0xc0 [<000000007e068c13>] nilfs_sysfs_create_device_group+0x98/0x3a0 [<00000000eec07d10>] init_nilfs+0x523/0x680 [<000000008f01dc52>] nilfs_mount+0x51b/0x890 [<00000000fc2d8288>] legacy_get_tree+0x2b/0x90 [<00000000f042961f>] vfs_get_tree+0x28/0x100 [<00000000703fc81c>] path_mount+0xc5e/0x1170 [<000000002489c4d9>] __x64_sys_mount+0x18e/0x1d0 [<000000007a133f78>] do_syscall_64+0x2d/0x70 [<00000000fb214107>] entry_SYSCALL_64_after_hwframe+0x44/0xa9