Warning: Permanently added '10.128.1.37' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 50.029247][ T3262] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 50.399259][ T3262] usb 1-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=ef.8f [ 50.408329][ T3262] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 50.417104][ T3262] usb 1-1: config 0 descriptor?? [ 50.669158][ T3262] usb 1-1: atusb_control_msg: req 0x10 val 0x0 idx 0x0, error -71 [ 50.677017][ T3262] usb 1-1: Firmware version (0.0) predates our first public release. [ 50.688088][ T3262] usb 1-1: Please update to version 0.2 or newer [ 50.695607][ T3262] usb 1-1: atusb_probe: initialization failed, error = -71 [ 50.704229][ T3262] atusb: probe of 1-1:0.0 failed with error -71 [ 50.711897][ T3262] usb 1-1: USB disconnect, device number 2 executing program [ 56.088605][ T3262] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 56.468735][ T3262] usb 1-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=ef.8f [ 56.477760][ T3262] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 56.486666][ T3262] usb 1-1: config 0 descriptor?? [ 56.748550][ T3262] usb 1-1: atusb_control_msg: req 0x10 val 0x0 idx 0x0, error -71 [ 56.756420][ T3262] usb 1-1: Firmware version (0.0) predates our first public release. [ 56.769393][ T3262] usb 1-1: Please update to version 0.2 or newer [ 56.775738][ T3262] usb 1-1: atusb_probe: initialization failed, error = -71 [ 56.785681][ T3262] atusb: probe of 1-1:0.0 failed with error -71 [ 56.793548][ T3262] usb 1-1: USB disconnect, device number 3 [ 57.747675][ T8441] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 63.844586][ T8441] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810d6fd840 (size 192): comm "kworker/1:2", pid 3262, jiffies 4294942319 (age 13.450s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 58 d8 6f 0d 81 88 ff ff ........X.o..... backtrace: [<00000000cc421405>] usb_alloc_urb+0x66/0xe0 [<00000000bf63af64>] atusb_probe+0x158/0x820 [<0000000007b08e63>] usb_probe_interface+0x177/0x370 [<0000000094530979>] really_probe+0x159/0x4a0 [<000000007aabeebb>] driver_probe_device+0x84/0x100 [<00000000ca0481f9>] __device_attach_driver+0xee/0x110 [<00000000545f28a2>] bus_for_each_drv+0xb7/0x100 [<00000000372a6b57>] __device_attach+0x122/0x250 [<00000000c74e25dc>] bus_probe_device+0xc6/0xe0 [<00000000e257cb21>] device_add+0x5be/0xc30 [<00000000bd43a916>] usb_set_configuration+0x9d9/0xb90 [<000000001f71d9d1>] usb_generic_driver_probe+0x8c/0xc0 [<000000004c271f91>] usb_probe_device+0x5c/0x140 [<0000000094530979>] really_probe+0x159/0x4a0 [<000000007aabeebb>] driver_probe_device+0x84/0x100 [<00000000ca0481f9>] __device_attach_driver+0xee/0x110 BUG: memory leak unreferenced object 0xffff8881091e5c00 (size 192): comm "kworker/1:2", pid 3262, jiffies 4294942319 (age 13.450s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 18 5c 1e 09 81 88 ff ff .........\...... backtrace: [<00000000cc421405>] usb_alloc_urb+0x66/0xe0 [<00000000bf63af64>] atusb_probe+0x158/0x820 [<0000000007b08e63>] usb_probe_interface+0x177/0x370 [<0000000094530979>] really_probe+0x159/0x4a0 [<000000007aabeebb>] driver_probe_device+0x84/0x100 [<00000000ca0481f9>] __device_attach_driver+0xee/0x110 [<00000000545f28a2>] bus_for_each_drv+0xb7/0x100 [<00000000372a6b57>] __device_attach+0x122/0x250 [<00000000c74e25dc>] bus_probe_device+0xc6/0xe0 [<00000000e257cb21>] device_add+0x5be/0xc30 [<00000000bd43a916>] usb_set_configuration+0x9d9/0xb90 [<000000001f71d9d1>] usb_generic_driver_probe+0x8c/0xc0 [<000000004c271f91>] usb_probe_device+0x5c/0x140 [<0000000094530979>] really_probe+0x159/0x4a0 [<000000007aabeebb>] driver_probe_device+0x84/0x100 [<00000000ca0481f9>] __device_attach_driver+0xee/0x110 BUG: memory leak unreferenced object 0xffff88810fd2a840 (size 192): comm "kworker/1:2", pid 3262, jiffies 4294942319 (age 13.450s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 58 a8 d2 0f 81 88 ff ff ........X....... backtrace: [<00000000cc421405>] usb_alloc_urb+0x66/0xe0 [<00000000bf63af64>] atusb_probe+0x158/0x820 [<0000000007b08e63>] usb_probe_interface+0x177/0x370 [<0000000094530979>] really_probe+0x159/0x4a0 [<000000007aabeebb>] driver_probe_device+0x84/0x100 [<00000000ca0481f9>] __device_attach_driver+0xee/0x110 [<00000000545f28a2>] bus_for_each_drv+0xb7/0x100 [<00000000372a6b57>] __device_attach+0x122/0x250 [<00000000c74e25dc>] bus_probe_device+0xc6/0xe0 [<00000000e257cb21>] device_add+0x5be/0xc30 [<00000000bd43a916>] usb_set_configuration+0x9d9/0xb90 [<000000001f71d9d1>] usb_generic_driver_probe+0x8c/0xc0 [<000000004c271f91>] usb_probe_device+0x5c/0x140 [<0000000094530979>] really_probe+0x159/0x4a0 [<000000007aabeebb>] driver_probe_device+0x84/0x100 [<00000000ca0481f9>] __device_attach_driver+0xee/0x110