DUID 00:04:76:88:70:88:c5:a2:06:f4:af:a5:1b:0f:a5:b0:65:ae forked to background, child pid 3207 [ 12.306283][ T3208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 12.308080][ T3208] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 69.871148][ T24] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.1.107' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program [ 238.111259][ T3645] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 244.930043][ T3646] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888105e4f780 (size 176): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 21.020s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105fcd840 (size 32): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 21.020s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edb480 (size 176): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 21.020s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b33940 (size 32): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 21.020s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105e4f780 (size 176): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 22.140s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105fcd840 (size 32): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 22.140s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edb480 (size 176): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 22.140s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b33940 (size 32): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 22.140s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105e4f780 (size 176): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 23.250s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105fcd840 (size 32): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 23.250s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edb480 (size 176): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 23.250s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b33940 (size 32): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 23.250s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105e4f780 (size 176): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.700s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105fcd840 (size 32): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edb480 (size 176): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.700s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b33940 (size 32): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105e4f780 (size 176): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.740s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105fcd840 (size 32): comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.740s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edb480 (size 176): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.740s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b33940 (size 32): comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.740s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd executing program executing program executing program [ 266.293849][ T3688] syz-executor103 (3688) used greatest stack depth: 10920 bytes left