[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.43' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 50.620129][ T8471] NILFS (loop0): unable to read secondary superblock (blocksize = 1024) [ 50.628553][ T8471] NILFS (loop0): broken superblock, retrying with spare superblock (blocksize = 1024) [ 50.639875][ T8471] NILFS (loop0): I/O error reading segment [ 50.646501][ T8471] NILFS (loop0): error -5 while searching super root executing program [ 56.043393][ T8477] NILFS (loop0): unable to read secondary superblock (blocksize = 1024) [ 56.051812][ T8477] NILFS (loop0): broken superblock, retrying with spare superblock (blocksize = 1024) [ 56.062447][ T8477] NILFS (loop0): I/O error reading segment [ 56.068500][ T8477] NILFS (loop0): error -5 while searching super root [ 57.294448][ T8470] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881103eb580 (size 32): comm "syz-executor790", pid 8471, jiffies 4294942334 (age 13.090s) hex dump (first 32 bytes): 6c 6f 6f 70 30 00 00 00 00 00 00 00 00 00 00 00 loop0........... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000005b6bf25>] kstrdup+0x36/0x70 [<000000004d924fc7>] kstrdup_const+0x53/0x80 [<0000000004bf9d15>] kvasprintf_const+0xc2/0x110 [<000000003545ccb8>] kobject_set_name_vargs+0x3b/0xe0 [<00000000ed718a3f>] kobject_init_and_add+0x6d/0xc0 [<00000000c8767041>] nilfs_sysfs_create_device_group+0x98/0x3a0 [<0000000051eba05b>] init_nilfs+0x523/0x680 [<0000000008050177>] nilfs_mount+0x51b/0x890 [<000000001925c35a>] legacy_get_tree+0x2b/0x90 [<00000000bd3ea427>] vfs_get_tree+0x28/0x100 [<0000000005bbd20d>] path_mount+0xc5e/0x1170 [<00000000a0632467>] __x64_sys_mount+0x18e/0x1d0 [<000000008c938b7e>] do_syscall_64+0x2d/0x70 [<000000004183b5fb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9