Warning: Permanently added '10.128.0.40' (ECDSA) to the list of known hosts. executing program [ 129.536383][ T3619] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 129.568311][ T3620] loop0: detected capacity change from 0 to 4096 [ 129.575189][ T3620] EXT4-fs: Ignoring removed bh option [ 129.592392][ T3620] EXT4-fs (loop0): Test dummy encryption mode enabled [ 129.599151][ T3620] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 129.612267][ T3620] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 129.622240][ T3620] EXT4-fs (loop0): can't mount with data=, fs mounted w/o journal executing program [ 135.016604][ T3626] loop0: detected capacity change from 0 to 4096 [ 135.023117][ T3626] EXT4-fs: Ignoring removed bh option [ 135.028780][ T3626] EXT4-fs (loop0): Test dummy encryption mode enabled [ 135.035542][ T3626] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 135.045634][ T3626] EXT4-fs (loop0): can't mount with data=, fs mounted w/o journal executing program [ 140.502309][ T3628] loop0: detected capacity change from 0 to 4096 [ 140.508809][ T3628] EXT4-fs: Ignoring removed bh option [ 140.514657][ T3628] EXT4-fs (loop0): Test dummy encryption mode enabled [ 140.521436][ T3628] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 140.531487][ T3628] EXT4-fs (loop0): can't mount with data=, fs mounted w/o journal executing program [ 145.950423][ T3630] loop0: detected capacity change from 0 to 4096 [ 145.956931][ T3630] EXT4-fs: Ignoring removed bh option [ 145.962736][ T3630] EXT4-fs (loop0): Test dummy encryption mode enabled [ 145.969484][ T3630] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 145.979549][ T3630] EXT4-fs (loop0): can't mount with data=, fs mounted w/o journal [ 147.209144][ T3619] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810cda0200 (size 512): comm "syz-executor356", pid 3628, jiffies 4294951319 (age 13.070s) hex dump (first 32 bytes): d8 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ................ 50 ed 29 82 ff ff ff ff 68 80 a4 0e 81 88 ff ff P.).....h....... backtrace: [] __kmalloc_node+0x44/0x130 [] crypto_create_tfm_node+0x30/0x130 [] crypto_alloc_tfm_node+0x96/0x180 [] fscrypt_init_hkdf+0x3c/0x180 [] add_master_key+0x160/0x370 [] fscrypt_add_test_dummy_key+0x93/0xc0 [] ext4_check_opt_consistency+0x79a/0xb80 [] ext4_fill_super+0xb0e/0x5010 [] get_tree_bdev+0x1f1/0x320 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810cee0e00 (size 32): comm "syz-executor356", pid 3628, jiffies 4294951319 (age 13.070s) hex dump (first 32 bytes): d0 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ................ 00 00 00 00 00 00 00 00 60 cc c7 85 ff ff ff ff ........`....... backtrace: [] __kmalloc_node+0x44/0x130 [] crypto_create_tfm_node+0x30/0x130 [] crypto_spawn_tfm2+0x45/0x90 [] hmac_init_tfm+0x3b/0xa0 [] crypto_shash_init_tfm+0x77/0xf0 [] crypto_create_tfm_node+0x52/0x130 [] crypto_alloc_tfm_node+0x96/0x180 [] fscrypt_init_hkdf+0x3c/0x180 [] add_master_key+0x160/0x370 [] fscrypt_add_test_dummy_key+0x93/0xc0 [] ext4_check_opt_consistency+0x79a/0xb80 [] ext4_fill_super+0xb0e/0x5010 [] get_tree_bdev+0x1f1/0x320 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 BUG: memory leak unreferenced object 0xffff88810b6f1800 (size 2048): comm "syz-executor356", pid 3628, jiffies 4294951319 (age 13.070s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc_trace+0x20/0x90 [] add_master_key+0x2c6/0x370 [] fscrypt_add_test_dummy_key+0x93/0xc0 [] ext4_check_opt_consistency+0x79a/0xb80 [] ext4_fill_super+0xb0e/0x5010 [] get_tree_bdev+0x1f1/0x320 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd