Warning: Permanently added '10.128.0.44' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 49.952426][ T3647] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 50.312458][ T3647] usb 1-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=32.33 [ 50.321544][ T3647] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 50.331478][ T3647] usb 1-1: config 0 descriptor?? [ 50.592404][ T3647] usb 1-1: atusb_control_msg: req 0x10 val 0x0 idx 0x0, error -71 [ 50.600258][ T3647] usb 1-1: Firmware version (0.0) predates our first public release. [ 50.608380][ T3647] usb 1-1: Please update to version 0.2 or newer [ 50.614916][ T3647] usb 1-1: atusb_probe: initialization failed, error = -71 [ 50.622176][ T3647] atusb: probe of 1-1:0.0 failed with error -71 [ 50.629825][ T3647] usb 1-1: USB disconnect, device number 2 executing program [ 56.022059][ T3647] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 56.412123][ T3647] usb 1-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=32.33 [ 56.421153][ T3647] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 56.430864][ T3647] usb 1-1: config 0 descriptor?? [ 56.692024][ T3647] usb 1-1: atusb_control_msg: req 0x10 val 0x0 idx 0x0, error -71 [ 56.699881][ T3647] usb 1-1: Firmware version (0.0) predates our first public release. [ 56.707960][ T3647] usb 1-1: Please update to version 0.2 or newer [ 56.714400][ T3647] usb 1-1: atusb_probe: initialization failed, error = -71 [ 56.721610][ T3647] atusb: probe of 1-1:0.0 failed with error -71 [ 56.729120][ T3647] usb 1-1: USB disconnect, device number 3 [ 57.699113][ T8494] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 61.705117][ T8494] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810d033cc0 (size 192): comm "kworker/0:2", pid 3647, jiffies 4294942305 (age 13.490s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 d8 3c 03 0d 81 88 ff ff .........<...... backtrace: [<00000000fffe7fef>] usb_alloc_urb+0x66/0xe0 [<0000000053d6110a>] atusb_probe+0x158/0x820 [<00000000b0b90de8>] usb_probe_interface+0x177/0x370 [<0000000030eff991>] really_probe+0x159/0x480 [<00000000727bfb68>] driver_probe_device+0x84/0x100 [<000000008322dba6>] __device_attach_driver+0xee/0x110 [<00000000c1ed47ed>] bus_for_each_drv+0xb7/0x100 [<00000000e96fe8fe>] __device_attach+0x122/0x250 [<000000007157ce4a>] bus_probe_device+0xc6/0xe0 [<00000000dabf8bbd>] device_add+0x5be/0xc30 [<000000009c484e5e>] usb_set_configuration+0x9d9/0xb90 [<0000000019853305>] usb_generic_driver_probe+0x8c/0xc0 [<000000003c8b7fca>] usb_probe_device+0x5c/0x140 [<0000000030eff991>] really_probe+0x159/0x480 [<00000000727bfb68>] driver_probe_device+0x84/0x100 [<000000008322dba6>] __device_attach_driver+0xee/0x110 BUG: memory leak unreferenced object 0xffff88810d06b480 (size 192): comm "kworker/0:2", pid 3647, jiffies 4294942305 (age 13.490s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 98 b4 06 0d 81 88 ff ff ................ backtrace: [<00000000fffe7fef>] usb_alloc_urb+0x66/0xe0 [<0000000053d6110a>] atusb_probe+0x158/0x820 [<00000000b0b90de8>] usb_probe_interface+0x177/0x370 [<0000000030eff991>] really_probe+0x159/0x480 [<00000000727bfb68>] driver_probe_device+0x84/0x100 [<000000008322dba6>] __device_attach_driver+0xee/0x110 [<00000000c1ed47ed>] bus_for_each_drv+0xb7/0x100 [<00000000e96fe8fe>] __device_attach+0x122/0x250 [<000000007157ce4a>] bus_probe_device+0xc6/0xe0 [<00000000dabf8bbd>] device_add+0x5be/0xc30 [<000000009c484e5e>] usb_set_configuration+0x9d9/0xb90 [<0000000019853305>] usb_generic_driver_probe+0x8c/0xc0 [<000000003c8b7fca>] usb_probe_device+0x5c/0x140 [<0000000030eff991>] really_probe+0x159/0x480 [<00000000727bfb68>] driver_probe_device+0x84/0x100 [<000000008322dba6>] __device_attach_driver+0xee/0x110 BUG: memory leak unreferenced object 0xffff88810dca9900 (size 192): comm "kworker/0:2", pid 3647, jiffies 4294942305 (age 13.490s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 18 99 ca 0d 81 88 ff ff ................ backtrace: [<00000000fffe7fef>] usb_alloc_urb+0x66/0xe0 [<0000000053d6110a>] atusb_probe+0x158/0x820 [<00000000b0b90de8>] usb_probe_interface+0x177/0x370 [<0000000030eff991>] really_probe+0x159/0x480 [<00000000727bfb68>] driver_probe_device+0x84/0x100 [<000000008322dba6>] __device_attach_driver+0xee/0x110 [<00000000c1ed47ed>] bus_for_each_drv+0xb7/0x100 [<00000000e96fe8fe>] __device_attach+0x122/0x250 [<000000007157ce4a>] bus_probe_device+0xc6/0xe0 [<00000000dabf8bbd>] device_add+0x5be/0xc30 [<000000009c484e5e>] usb_set_configuration+0x9d9/0xb90 [<0000000019853305>] usb_generic_driver_probe+0x8c/0xc0 [<000000003c8b7fca>] usb_probe_device+0x5c/0x140 [<0000000030eff991>] really_probe+0x159/0x480 [<00000000727bfb68>] driver_probe_device+0x84/0x100 [<000000008322dba6>] __device_attach_driver+0xee/0x110 [ 63.800172][ T8494] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak)