[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.177' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 44.565781][ T5] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 44.805697][ T5] usb 1-1: Using ep0 maxpacket: 32 [ 44.925661][ T5] usb 1-1: unable to get BOS descriptor or descriptor too short [ 44.985672][ T5] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 44.993238][ T5] usb 1-1: can't read configurations, error -71 executing program [ 50.344627][ T5] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 50.604591][ T5] usb 1-1: Using ep0 maxpacket: 32 [ 50.744608][ T5] usb 1-1: unable to get BOS descriptor or descriptor too short [ 50.814688][ T5] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 50.822267][ T5] usb 1-1: can't read configurations, error -71 executing program [ 56.143886][ T54] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 56.383899][ T54] usb 1-1: Using ep0 maxpacket: 32 [ 56.504111][ T54] usb 1-1: unable to get BOS descriptor or descriptor too short [ 56.563964][ T54] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 56.571682][ T54] usb 1-1: can't read configurations, error -71 [ 57.482094][ T8495] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 63.641154][ T8495] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810cd60820 (size 32): comm "softirq", pid 0, jiffies 4294942309 (age 13.340s) hex dump (first 32 bytes): 02 00 00 00 08 00 00 00 80 06 00 01 00 00 40 00 ..............@. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ab514212>] gadget_setup+0xf6/0x220 [<00000000d2edc025>] dummy_timer+0xb9f/0x14c0 [<00000000d32e3c4d>] call_timer_fn+0x38/0x200 [<00000000f4242fb8>] __run_timers.part.0+0x319/0x400 [<000000000ee7f019>] run_timer_softirq+0x3d/0x80 [<00000000e1218b72>] __do_softirq+0xcc/0x2c2 [<000000006f86be57>] asm_call_irq_on_stack+0xf/0x20 [<000000002614bab9>] do_softirq_own_stack+0x32/0x40 [<00000000140b6701>] irq_exit_rcu+0x91/0xc0 [<0000000018e4f6f7>] sysvec_apic_timer_interrupt+0x36/0x80 [<00000000eea0285b>] asm_sysvec_apic_timer_interrupt+0x12/0x20 [<00000000afc16c92>] acpi_idle_do_entry+0xc3/0xd0 [<00000000083826a2>] acpi_idle_enter+0x128/0x1f0 [<00000000a55707a0>] cpuidle_enter_state+0xc9/0x650 [<00000000c9c66c1b>] cpuidle_enter+0x29/0x40 [<000000002d98501a>] do_idle+0x1c8/0x250 BUG: memory leak unreferenced object 0xffff88810cd60840 (size 32): comm "softirq", pid 0, jiffies 4294942339 (age 13.040s) hex dump (first 32 bytes): 02 00 00 00 08 00 00 00 80 06 00 0f 00 00 05 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ab514212>] gadget_setup+0xf6/0x220 [<00000000d2edc025>] dummy_timer+0xb9f/0x14c0 [<00000000d32e3c4d>] call_timer_fn+0x38/0x200 [<00000000f4242fb8>] __run_timers.part.0+0x319/0x400 [<000000000ee7f019>] run_timer_softirq+0x3d/0x80 [<00000000e1218b72>] __do_softirq+0xcc/0x2c2 [<000000006f86be57>] asm_call_irq_on_stack+0xf/0x20 [<000000002614bab9>] do_softirq_own_stack+0x32/0x40 [<00000000140b6701>] irq_exit_rcu+0x91/0xc0 [<0000000018e4f6f7>] sysvec_apic_timer_interrupt+0x36/0x80 [<00000000eea0285b>] asm_sysvec_apic_timer_interrupt+0x12/0x20 [<00000000afc16c92>] acpi_idle_do_entry+0xc3/0xd0 [<00000000083826a2>] acpi_idle_enter+0x128/0x1f0 [<00000000a55707a0>] cpuidle_enter_state+0xc9/0x650 [<00000000c9c66c1b>] cpuidle_enter+0x29/0x40 [<000000002d98501a>] do_idle+0x1c8/0x250 BUG: memory leak unreferenced object 0xffff88810cd60780 (size 32): comm "syz-executor311", pid 8508, jiffies 4294942858 (age 7.850s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000a21eeb92>] gadget_bind+0x223/0x340 [<00000000ea135334>] udc_bind_to_driver+0x62/0x150 [<00000000ec6e9aa0>] usb_gadget_probe_driver+0x1c7/0x230 [<0000000016cc0261>] raw_ioctl+0x5da/0xf30 [<000000008a0217f9>] __x64_sys_ioctl+0xfc/0x140 [<000000008bf0c751>] do_syscall_64+0x2d/0x70 [<00000000982f55db>] entry_SYSCALL_64_after_hwframe+0x44/0xa9