forked to background, child pid 3207 [ 12.592809][ T3208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 12.595560][ T3208] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: [ 12.669073][ T3292] ssh-keygen (3292) used greatest stack depth: 10872 bytes left OK syzkaller syzkaller login: [ 69.877018][ T99] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.1.3' (ECDSA) to the list of known hosts. executing program [ 80.800235][ T3632] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 80.841529][ T3640] loop0: detected capacity change from 0 to 4096 [ 80.853940][ T3640] Cannot load nls cp<37 executing program [ 86.566883][ T3643] loop0: detected capacity change from 0 to 4096 [ 86.578960][ T3643] Cannot load nls cp<37 executing program [ 92.265302][ T3645] loop0: detected capacity change from 0 to 4096 [ 92.277845][ T3645] Cannot load nls cp<37 [ 93.564267][ T3632] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 97.834003][ T3632] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810f88cec0 (size 32): comm "syz-executor175", pid 3643, jiffies 4294945925 (age 13.630s) hex dump (first 32 bytes): 20 a3 26 11 81 88 ff ff 00 00 00 00 00 00 00 00 .&............. 00 00 00 00 00 00 00 00 fa ff c0 ff 79 00 00 00 ............y... backtrace: [] kmalloc_trace+0x20/0x90 [] ntfs_init_fs_context+0x22/0x1e0 [] alloc_fs_context+0x225/0x3b0 [] path_mount+0x6f3/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88811126a320 (size 32): comm "syz-executor175", pid 3643, jiffies 4294945925 (age 13.630s) hex dump (first 32 bytes): 63 70 3c 33 37 00 00 00 00 00 00 00 00 00 00 00 cp<37........... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc_node_track_caller+0x47/0x120 [] kmemdup_nul+0x32/0x70 [] vfs_parse_fs_string+0x6e/0xd0 [] generic_parse_monolithic+0xe0/0x130 [] path_mount+0xb94/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd