DUID 00:04:76:88:70:88:c5:a2:06:f4:af:a5:1b:0f:a5:b0:65:ae forked to background, child pid 3207 [ 12.306283][ T3208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 12.308080][ T3208] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 69.871148][ T24] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.1.107' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program [ 238.111259][ T3645] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 244.930043][ T3646] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888105e4f780 (size 176): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 21.020s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812a1ba7>] prepare_creds+0x27/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105fcd840 (size 32): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 21.020s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814ee076>] __kmalloc+0x46/0x120 [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0 [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edb480 (size 176): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 21.020s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812a1ba7>] prepare_creds+0x27/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b33940 (size 32): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 21.020s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814ee076>] __kmalloc+0x46/0x120 [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0 [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105e4f780 (size 176): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 22.140s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812a1ba7>] prepare_creds+0x27/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105fcd840 (size 32): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 22.140s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814ee076>] __kmalloc+0x46/0x120 [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0 [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edb480 (size 176): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 22.140s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812a1ba7>] prepare_creds+0x27/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b33940 (size 32): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 22.140s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814ee076>] __kmalloc+0x46/0x120 [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0 [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105e4f780 (size 176): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 23.250s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812a1ba7>] prepare_creds+0x27/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105fcd840 (size 32): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 23.250s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814ee076>] __kmalloc+0x46/0x120 [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0 [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edb480 (size 176): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 23.250s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812a1ba7>] prepare_creds+0x27/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b33940 (size 32): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 23.250s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814ee076>] __kmalloc+0x46/0x120 [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0 [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105e4f780 (size 176): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.700s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812a1ba7>] prepare_creds+0x27/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105fcd840 (size 32): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814ee076>] __kmalloc+0x46/0x120 [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0 [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edb480 (size 176): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.700s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812a1ba7>] prepare_creds+0x27/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b33940 (size 32): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814ee076>] __kmalloc+0x46/0x120 [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0 [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105e4f780 (size 176): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.740s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812a1ba7>] prepare_creds+0x27/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105fcd840 (size 32): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.740s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814ee076>] __kmalloc+0x46/0x120 [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0 [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edb480 (size 176): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.740s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812a1ba7>] prepare_creds+0x27/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b33940 (size 32): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.740s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814ee076>] __kmalloc+0x46/0x120 [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0 [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470 [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730 [<ffffffff815fecec>] mount_nodev+0x5c/0xc0 [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90 [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100 [<ffffffff81640317>] path_mount+0xc37/0x10d0 [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0 [<ffffffff848802b5>] do_syscall_64+0x35/0xb0 [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd executing program executing program executing program [ 266.293849][ T3688] syz-executor103 (3688) used greatest stack depth: 10920 bytes left