DUID 00:04:8f:6f:85:01:bf:a7:cc:33:b0:df:c3:3c:8d:7f:9b:67 forked to background, child pid 3179 [ 12.470608][ T3180] 8021q: adding VLAN 0 to HW filter on device bond0 [ 12.474331][ T3180] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 69.872648][ T786] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.0.127' (ECDSA) to the list of known hosts. executing program [ 93.038781][ T3607] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 93.071284][ T3610] loop0: detected capacity change from 0 to 4096 [ 93.078519][ T3610] ntfs3: loop0: Different NTFS' sector size (1024) and media sector size (512) [ 93.088368][ T3610] ntfs3: loop0: Failed to load $MFT. executing program [ 98.424396][ T3611] loop0: detected capacity change from 0 to 4096 [ 98.430998][ T3611] ntfs3: loop0: Different NTFS' sector size (1024) and media sector size (512) [ 98.440635][ T3611] ntfs3: loop0: Failed to load $MFT. [ 99.584365][ T3607] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810beeb840 (size 32): comm "syz-executor566", pid 3610, jiffies 4294946576 (age 12.730s) hex dump (first 32 bytes): 00 b8 ee 0b 81 88 ff ff 20 8e e1 85 ff ff ff ff ........ ....... 00 00 00 00 00 00 00 00 f6 ff f6 ff 13 02 00 00 ................ backtrace: [] kmalloc_trace+0x20/0x90 [] ntfs_init_fs_context+0x22/0x1e0 [] alloc_fs_context+0x225/0x3b0 [] path_mount+0x6f3/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810beeb800 (size 32): comm "syz-executor566", pid 3610, jiffies 4294946576 (age 12.730s) hex dump (first 32 bytes): 65 75 63 2d 6a 70 00 00 00 00 00 00 00 00 00 00 euc-jp.......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc_node_track_caller+0x47/0x120 [] kmemdup_nul+0x32/0x70 [] vfs_parse_fs_string+0x6e/0xd0 [] generic_parse_monolithic+0xe0/0x130 [] path_mount+0xb94/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd