[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.133' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 121.982223][ T6645] FS-Cache: Duplicate cookie detected [ 121.987684][ T6645] FS-Cache: O-cookie c=00000000044d7763 [p=00000000dbee46f3 fl=222 nc=0 na=1] [ 121.996574][ T6645] FS-Cache: O-cookie d=0000000065201c7e n=00000000f2f02626 [ 121.996576][ T6645] FS-Cache: O-key=[17] '657468316e6f64657676626f786e657430' [ 121.996595][ T6645] FS-Cache: N-cookie c=000000002c3ba569 [p=00000000dbee46f3 fl=2 nc=0 na=1] [ 121.996598][ T6645] FS-Cache: N-cookie d=0000000065201c7e n=00000000f7f6a081 [ 121.996600][ T6645] FS-Cache: N-key=[17] '657468316e6f64657676626f786e657430' [ 129.014783][ T6636] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811db60320 (size 32): comm "syz-executor059", pid 6645, jiffies 4294949472 (age 25.050s) hex dump (first 32 bytes): 65 74 68 31 6e 6f 64 65 76 76 62 6f 78 6e 65 74 eth1nodevvboxnet 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... backtrace: [<000000003fbe51b2>] kmemdup_nul+0x2d/0x70 [<00000000e10b29e4>] v9fs_session_init+0x29e/0x880 [<00000000fd6e7871>] v9fs_mount+0x56/0x390 [<00000000075c6055>] legacy_get_tree+0x23/0x70 [<00000000dd6a4121>] vfs_get_tree+0x28/0xe0 [<00000000065a21c9>] do_mount+0x958/0xcd0 [<000000007d2ba92d>] __x64_sys_mount+0xb0/0x120 [<00000000a47b4de9>] do_syscall_64+0x6e/0x220 [<000000005b8cc386>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811db60320 (size 32): comm "syz-executor059", pid 6645, jiffies 4294949472 (age 26.530s) hex dump (first 32 bytes): 65 74 68 31 6e 6f 64 65 76 76 62 6f 78 6e 65 74 eth1nodevvboxnet 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... backtrace: [<000000003fbe51b2>] kmemdup_nul+0x2d/0x70 [<00000000e10b29e4>] v9fs_session_init+0x29e/0x880 [<00000000fd6e7871>] v9fs_mount+0x56/0x390 [<00000000075c6055>] legacy_get_tree+0x23/0x70 [<00000000dd6a4121>] vfs_get_tree+0x28/0xe0 [<00000000065a21c9>] do_mount+0x958/0xcd0 [<000000007d2ba92d>] __x64_sys_mount+0xb0/0x120 [<00000000a47b4de9>] do_syscall_64+0x6e/0x220 [<000000005b8cc386>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811db60320 (size 32): comm "syz-executor059", pid 6645, jiffies 4294949472 (age 28.030s) hex dump (first 32 bytes): 65 74 68 31 6e 6f 64 65 76 76 62 6f 78 6e 65 74 eth1nodevvboxnet 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... backtrace: [<000000003fbe51b2>] kmemdup_nul+0x2d/0x70 [<00000000e10b29e4>] v9fs_session_init+0x29e/0x880 [<00000000fd6e7871>] v9fs_mount+0x56/0x390 [<00000000075c6055>] legacy_get_tree+0x23/0x70 [<00000000dd6a4121>] vfs_get_tree+0x28/0xe0 [<00000000065a21c9>] do_mount+0x958/0xcd0 [<000000007d2ba92d>] __x64_sys_mount+0xb0/0x120 [<00000000a47b4de9>] do_syscall_64+0x6e/0x220 [<000000005b8cc386>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811db60320 (size 32): comm "syz-executor059", pid 6645, jiffies 4294949472 (age 29.530s) hex dump (first 32 bytes): 65 74 68 31 6e 6f 64 65 76 76 62 6f 78 6e 65 74 eth1nodevvboxnet 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... backtrace: [<000000003fbe51b2>] kmemdup_nul+0x2d/0x70 [<00000000e10b29e4>] v9fs_session_init+0x29e/0x880 [<00000000fd6e7871>] v9fs_mount+0x56/0x390 [<00000000075c6055>] legacy_get_tree+0x23/0x70 [<00000000dd6a4121>] vfs_get_tree+0x28/0xe0 [<00000000065a21c9>] do_mount+0x958/0xcd0 [<000000007d2ba92d>] __x64_sys_mount+0xb0/0x120 [<00000000a47b4de9>] do_syscall_64+0x6e/0x220 [<000000005b8cc386>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811db60320 (size 32): comm "syz-executor059", pid 6645, jiffies 4294949472 (age 30.960s) hex dump (first 32 bytes): 65 74 68 31 6e 6f 64 65 76 76 62 6f 78 6e 65 74 eth1nodevvboxnet 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... backtrace: [<000000003fbe51b2>] kmemdup_nul+0x2d/0x70 [<00000000e10b29e4>] v9fs_session_init+0x29e/0x880 [<00000000fd6e7871>] v9fs_mount+0x56/0x390 [<00000000075c6055>] legacy_get_tree+0x23/0x70 [<00000000dd6a4121>] vfs_get_tree+0x28/0xe0 [<00000000065a21c9>] do_mount+0x958/0xcd0 [<000000007d2ba92d>] __x64_sys_mount+0xb0/0x120 [<00000000a47b4de9>] do_syscall_64+0x6e/0x220 [<000000005b8cc386>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811db60320 (size 32): comm "syz-executor059", pid 6645, jiffies 4294949472 (age 32.410s) hex dump (first 32 bytes): 65 74 68 31 6e 6f 64 65 76 76 62 6f 78 6e 65 74 eth1nodevvboxnet 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... backtrace: [<000000003fbe51b2>] kmemdup_nul+0x2d/0x70 [<00000000e10b29e4>] v9fs_session_init+0x29e/0x880 [<00000000fd6e7871>] v9fs_mount+0x56/0x390 [<00000000075c6055>] legacy_get_tree+0x23/0x70 [<00000000dd6a4121>] vfs_get_tree+0x28/0xe0 [<00000000065a21c9>] do_mount+0x958/0xcd0 [<000000007d2ba92d>] __x64_sys_mount+0xb0/0x120 [<00000000a47b4de9>] do_syscall_64+0x6e/0x220 [<000000005b8cc386>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811db60320 (size 32): comm "syz-executor059", pid 6645, jiffies 4294949472 (age 33.850s) hex dump (first 32 bytes): 65 74 68 31 6e 6f 64 65 76 76 62 6f 78 6e 65 74 eth1nodevvboxnet 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... backtrace: [<000000003fbe51b2>] kmemdup_nul+0x2d/0x70 [<00000000e10b29e4>] v9fs_session_init+0x29e/0x880 [<00000000fd6e7871>] v9fs_mount+0x56/0x390 [<00000000075c6055>] legacy_get_tree+0x23/0x70 [<00000000dd6a4121>] vfs_get_tree+0x28/0xe0 [<00000000065a21c9>] do_mount+0x958/0xcd0 [<000000007d2ba92d>] __x64_sys_mount+0xb0/0x120 [<00000000a47b4de9>] do_syscall_64+0x6e/0x220 [<000000005b8cc386>] entry_SYSCALL_64_after_hwframe+0x44/0xa9