Warning: Permanently added '10.128.0.75' (ECDSA) to the list of known hosts. executing program [ 288.899467][ T3622] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 288.940125][ T3624] loop0: detected capacity change from 0 to 4096 [ 288.959331][ T3624] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 288.967864][ T3624] EXT4-fs (loop0): Test dummy encryption mode enabled [ 288.974690][ T3624] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 288.984500][ T3624] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 288.994480][ T3624] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 289.004273][ T3624] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 289.013887][ T3624] EXT4-fs error (device loop0): __ext4_fill_super:5386: inode #2: comm syz-executor123: iget: bogus i_mode (71400) [ 289.026040][ T3624] EXT4-fs (loop0): get root inode failed [ 289.031646][ T3624] EXT4-fs (loop0): mount failed executing program [ 294.300436][ T3632] loop0: detected capacity change from 0 to 4096 [ 294.307240][ T3632] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 294.315665][ T3632] EXT4-fs (loop0): Test dummy encryption mode enabled [ 294.322477][ T3632] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 294.332193][ T3632] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 294.341905][ T3632] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 294.351552][ T3632] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 294.360968][ T3632] EXT4-fs error (device loop0): __ext4_fill_super:5386: inode #2: comm syz-executor123: iget: bogus i_mode (71400) [ 294.373220][ T3632] EXT4-fs (loop0): get root inode failed [ 294.378908][ T3632] EXT4-fs (loop0): mount failed executing program [ 299.703995][ T3635] loop0: detected capacity change from 0 to 4096 [ 299.710981][ T3635] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 299.719443][ T3635] EXT4-fs (loop0): Test dummy encryption mode enabled [ 299.726290][ T3635] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 299.736017][ T3635] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 299.745760][ T3635] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 299.755403][ T3635] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 299.764811][ T3635] EXT4-fs error (device loop0): __ext4_fill_super:5386: inode #2: comm syz-executor123: iget: bogus i_mode (71400) [ 299.777020][ T3635] EXT4-fs (loop0): get root inode failed [ 299.782635][ T3635] EXT4-fs (loop0): mount failed [ 304.930586][ T3622] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888102480200 (size 512): comm "syz-executor123", pid 3632, jiffies 4294966699 (age 12.780s) hex dump (first 32 bytes): d8 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ................ 70 13 2a 82 ff ff ff ff 68 e0 93 07 81 88 ff ff p.*.....h....... backtrace: [] __kmalloc_node+0x44/0x130 [] crypto_create_tfm_node+0x30/0x130 [] crypto_alloc_tfm_node+0x96/0x180 [] fscrypt_init_hkdf+0x3c/0x180 [] add_master_key+0x160/0x370 [] fscrypt_add_test_dummy_key+0x93/0xc0 [] ext4_check_opt_consistency+0x79a/0xb80 [] ext4_fill_super+0xb0e/0x5010 [] get_tree_bdev+0x1f1/0x320 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888111007960 (size 32): comm "syz-executor123", pid 3632, jiffies 4294966699 (age 12.780s) hex dump (first 32 bytes): d0 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ................ 00 00 00 00 00 00 00 00 60 cc c7 85 ff ff ff ff ........`....... backtrace: [] __kmalloc_node+0x44/0x130 [] crypto_create_tfm_node+0x30/0x130 [] crypto_spawn_tfm2+0x45/0x90 [] hmac_init_tfm+0x3b/0xa0 [] crypto_shash_init_tfm+0x77/0xf0 [] crypto_create_tfm_node+0x52/0x130 [] crypto_alloc_tfm_node+0x96/0x180 [] fscrypt_init_hkdf+0x3c/0x180 [] add_master_key+0x160/0x370 [] fscrypt_add_test_dummy_key+0x93/0xc0 [] ext4_check_opt_consistency+0x79a/0xb80 [] ext4_fill_super+0xb0e/0x5010 [] get_tree_bdev+0x1f1/0x320 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 BUG: memory leak unreferenced object 0xffff88810fb1f800 (size 2048): comm "syz-executor123", pid 3632, jiffies 4294966699 (age 12.780s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc_trace+0x20/0x90 [] add_master_key+0x2c6/0x370 [] fscrypt_add_test_dummy_key+0x93/0xc0 [] ext4_check_opt_consistency+0x79a/0xb80 [] ext4_fill_super+0xb0e/0x5010 [] get_tree_bdev+0x1f1/0x320 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd