Warning: Permanently added '10.128.10.27' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 58.895930][ T3626] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 59.256022][ T3626] usb 1-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=ef.8f [ 59.265201][ T3626] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 59.274277][ T3626] usb 1-1: config 0 descriptor?? [ 59.535922][ T3626] usb 1-1: atusb_control_msg: req 0x10 val 0x0 idx 0x0, error -71 [ 59.543927][ T3626] usb 1-1: Firmware version (0.0) predates our first public release. [ 59.554929][ T3626] usb 1-1: Please update to version 0.2 or newer [ 59.562973][ T3626] usb 1-1: atusb_probe: initialization failed, error = -71 [ 59.571730][ T3626] atusb: probe of 1-1:0.0 failed with error -71 [ 59.579393][ T3626] usb 1-1: USB disconnect, device number 2 executing program [ 65.875457][ T3626] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 66.245525][ T3626] usb 1-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=ef.8f [ 66.254818][ T3626] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 66.263788][ T3626] usb 1-1: config 0 descriptor?? [ 66.545454][ T3626] usb 1-1: atusb_control_msg: req 0x10 val 0x0 idx 0x0, error -71 [ 66.553418][ T3626] usb 1-1: Firmware version (0.0) predates our first public release. [ 66.561805][ T3626] usb 1-1: Please update to version 0.2 or newer [ 66.568358][ T3626] usb 1-1: atusb_probe: initialization failed, error = -71 [ 66.575933][ T3626] atusb: probe of 1-1:0.0 failed with error -71 [ 66.583553][ T3626] usb 1-1: USB disconnect, device number 3 [ 71.507114][ T8405] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 73.575799][ T8405] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810b8da0c0 (size 192): comm "kworker/0:2", pid 3626, jiffies 4294943194 (age 14.320s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 d8 a0 8d 0b 81 88 ff ff ................ backtrace: [<00000000b901b0bb>] usb_alloc_urb+0x66/0xe0 [<00000000c0a8a0bd>] atusb_probe+0x158/0x820 [<00000000554b0d8d>] usb_probe_interface+0x177/0x370 [<0000000001258a92>] really_probe+0x159/0x4a0 [<0000000081a3c7e0>] driver_probe_device+0x84/0x100 [<00000000548782be>] __device_attach_driver+0xee/0x110 [<00000000ee75db79>] bus_for_each_drv+0xb7/0x100 [<0000000099b3ea95>] __device_attach+0x122/0x250 [<000000006981e7cf>] bus_probe_device+0xc6/0xe0 [<00000000bcee7d0c>] device_add+0x5be/0xc30 [<00000000671c68f8>] usb_set_configuration+0x9d9/0xb90 [<00000000e4c58542>] usb_generic_driver_probe+0x8c/0xc0 [<000000007a91d3cf>] usb_probe_device+0x5c/0x140 [<0000000001258a92>] really_probe+0x159/0x4a0 [<0000000081a3c7e0>] driver_probe_device+0x84/0x100 [<00000000548782be>] __device_attach_driver+0xee/0x110 BUG: memory leak unreferenced object 0xffff88810b8da300 (size 192): comm "kworker/0:2", pid 3626, jiffies 4294943895 (age 7.310s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 18 a3 8d 0b 81 88 ff ff ................ backtrace: [<00000000b901b0bb>] usb_alloc_urb+0x66/0xe0 [<00000000c0a8a0bd>] atusb_probe+0x158/0x820 [<00000000554b0d8d>] usb_probe_interface+0x177/0x370 [<0000000001258a92>] really_probe+0x159/0x4a0 [<0000000081a3c7e0>] driver_probe_device+0x84/0x100 [<00000000548782be>] __device_attach_driver+0xee/0x110 [<00000000ee75db79>] bus_for_each_drv+0xb7/0x100 [<0000000099b3ea95>] __device_attach+0x122/0x250 [<000000006981e7cf>] bus_probe_device+0xc6/0xe0 [<00000000bcee7d0c>] device_add+0x5be/0xc30 [<00000000671c68f8>] usb_set_configuration+0x9d9/0xb90 [<00000000e4c58542>] usb_generic_driver_probe+0x8c/0xc0 [<000000007a91d3cf>] usb_probe_device+0x5c/0x140 [<0000000001258a92>] really_probe+0x159/0x4a0 [<0000000081a3c7e0>] driver_probe_device+0x84/0x100 [<00000000548782be>] __device_attach_driver+0xee/0x110 BUG: memory leak unreferenced object 0xffff8881105ebcc0 (size 192): comm "kworker/0:2", pid 3626, jiffies 4294943895 (age 7.310s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 d8 bc 5e 10 81 88 ff ff ..........^..... backtrace: [<00000000b901b0bb>] usb_alloc_urb+0x66/0xe0 [<00000000c0a8a0bd>] atusb_probe+0x158/0x820 [<00000000554b0d8d>] usb_probe_interface+0x177/0x370 [<0000000001258a92>] really_probe+0x159/0x4a0 [<0000000081a3c7e0>] driver_probe_device+0x84/0x100 [<00000000548782be>] __device_attach_driver+0xee/0x110 [<00000000ee75db79>] bus_for_each_drv+0xb7/0x100 [<0000000099b3ea95>] __device_attach+0x122/0x250 [<000000006981e7cf>] bus_probe_device+0xc6/0xe0 [<00000000bcee7d0c>] device_add+0x5be/0xc30 [<00000000671c68f8>] usb_set_configuration+0x9d9/0xb90 [<00000000e4c58542>] usb_generic_driver_probe+0x8c/0xc0 [<000000007a91d3cf>] usb_probe_device+0x5c/0x140 [<0000000001258a92>] really_probe+0x159/0x4a0 [<0000000081a3c7e0>] driver_probe_device+0x84/0x100 [<00000000548782be>] __device_attach_driver+0xee/0x110