[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.30' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 48.839254][ T3709] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 49.079158][ T3709] usb 1-1: Using ep0 maxpacket: 16 [ 49.209197][ T3709] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 49.399182][ T3709] usb 1-1: New USB device found, idVendor=1770, idProduct=ff00, bcdDevice= 0.40 [ 49.408203][ T3709] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 49.416258][ T3709] usb 1-1: Product: syz [ 49.420729][ T3709] usb 1-1: Manufacturer: syz [ 49.425295][ T3709] usb 1-1: SerialNumber: syz [ 49.469767][ T3709] usbhid 1-1:1.0: couldn't find an input interrupt endpoint [ 49.669605][ T17] usb 1-1: USB disconnect, device number 2 [ 54.680497][ T8477] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888110341660 (size 32): comm "syz-executor507", pid 8478, jiffies 4294942113 (age 8.330s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000002ab71a99>] gadget_bind+0x223/0x340 [<00000000bea23ab5>] udc_bind_to_driver+0x62/0x150 [<00000000d25dbf88>] usb_gadget_probe_driver+0x1c7/0x230 [<000000009592c4c7>] raw_ioctl+0x5da/0xf30 [<000000001853e233>] __x64_sys_ioctl+0xfc/0x140 [<000000005dc3fcd8>] do_syscall_64+0x2d/0x70 [<00000000e569c116>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811002a360 (size 32): comm "softirq", pid 0, jiffies 4294942142 (age 8.040s) hex dump (first 32 bytes): 02 00 00 00 08 00 00 00 80 06 00 01 00 00 40 00 ..............@. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ba59ba3e>] gadget_setup+0xf6/0x220 [<0000000063a9994a>] dummy_timer+0xb9f/0x14c0 [<000000009a69359c>] call_timer_fn+0x38/0x200 [<00000000ed0b3b0c>] __run_timers.part.0+0x319/0x400 [<00000000518de414>] run_timer_softirq+0x3d/0x80 [<000000004164da10>] __do_softirq+0xcc/0x2c2 [<000000005ebeb0be>] asm_call_irq_on_stack+0xf/0x20 [<000000006660f5f1>] do_softirq_own_stack+0x32/0x40 [<00000000c180c31c>] irq_exit_rcu+0x91/0xc0 [<000000006d2c4f32>] sysvec_apic_timer_interrupt+0x36/0x80 [<00000000f12268c3>] asm_sysvec_apic_timer_interrupt+0x12/0x20 [<00000000135d5c41>] acpi_idle_do_entry+0xc3/0xd0 [<000000008fbdf851>] acpi_idle_enter+0x128/0x1f0 [<000000003ef554f9>] cpuidle_enter_state+0xc9/0x650 [<0000000096c22303>] cpuidle_enter+0x29/0x40 [<00000000967871a3>] do_idle+0x1c8/0x250 BUG: memory leak unreferenced object 0xffff88811002a3a0 (size 32): comm "softirq", pid 0, jiffies 4294942171 (age 7.750s) hex dump (first 32 bytes): 02 00 00 00 08 00 00 00 80 06 00 02 00 00 09 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ba59ba3e>] gadget_setup+0xf6/0x220 [<0000000063a9994a>] dummy_timer+0xb9f/0x14c0 [<000000009a69359c>] call_timer_fn+0x38/0x200 [<00000000ed0b3b0c>] __run_timers.part.0+0x319/0x400 [<00000000518de414>] run_timer_softirq+0x3d/0x80 [<000000004164da10>] __do_softirq+0xcc/0x2c2 [<000000005ebeb0be>] asm_call_irq_on_stack+0xf/0x20 [<000000006660f5f1>] do_softirq_own_stack+0x32/0x40 [<00000000c180c31c>] irq_exit_rcu+0x91/0xc0 [<000000006d2c4f32>] sysvec_apic_timer_interrupt+0x36/0x80 [<00000000f12268c3>] asm_sysvec_apic_timer_interrupt+0x12/0x20 [<00000000135d5c41>] acpi_idle_do_entry+0xc3/0xd0 [<000000008fbdf851>] acpi_idle_enter+0x128/0x1f0 [<000000003ef554f9>] cpuidle_enter_state+0xc9/0x650 [<0000000096c22303>] cpuidle_enter+0x29/0x40 [<00000000967871a3>] do_idle+0x1c8/0x250 [ 56.839746][ T8477] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak)