DUID 00:04:8f:6f:85:01:bf:a7:cc:33:b0:df:c3:3c:8d:7f:9b:67 forked to background, child pid 3206 [ 12.631074][ T3207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 12.635299][ T3207] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 69.863462][ T148] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.0.111' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program [ 239.427879][ T3652] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 245.783713][ T3658] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888105edcb40 (size 176): comm "syz-executor212", pid 3677, jiffies 4294961222 (age 17.700s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881024735e0 (size 32): comm "syz-executor212", pid 3677, jiffies 4294961222 (age 17.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881061c2c00 (size 176): comm "syz-executor212", pid 3678, jiffies 4294961222 (age 17.700s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105d74780 (size 32): comm "syz-executor212", pid 3678, jiffies 4294961222 (age 17.700s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105edcd80 (size 176): comm "syz-executor212", pid 3679, jiffies 4294961222 (age 17.700s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd executing program executing program executing program executing program [ 264.794369][ T23] audit: type=1800 audit(1670354271.275:2): pid=3705 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz-executor212" name="file0" dev="overlay" ino=1154 res=0 errno=0 executing program executing program executing program [ 265.323055][ T3716] syz-executor212 (3716) used greatest stack depth: 11016 bytes left