[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.22' (ECDSA) to the list of known hosts. 2020/05/01 09:24:40 parsed 1 programs syzkaller login: [ 77.300105][ T3833] kmemleak: Automatic memory scanning thread ended 2020/05/01 09:24:48 executed programs: 0 [ 84.723270][ T26] audit: type=1400 audit(1588325088.554:8): avc: denied { execmem } for pid=6630 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 84.736341][ T6631] IPVS: ftp: loaded support on port[0] = 21 [ 84.769540][ T6631] chnl_net:caif_netlink_parms(): no params data found [ 84.837019][ T6631] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.844100][ T6631] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.851331][ T6631] device bridge_slave_0 entered promiscuous mode [ 84.858539][ T6631] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.865931][ T6631] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.873602][ T6631] device bridge_slave_1 entered promiscuous mode [ 84.883701][ T6631] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.893585][ T6631] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.906065][ T6631] team0: Port device team_slave_0 added [ 84.912099][ T6631] team0: Port device team_slave_1 added [ 84.921612][ T6631] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 84.928788][ T6631] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.954983][ T6631] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 84.966055][ T6631] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 84.973189][ T6631] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.999361][ T6631] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.053674][ T6631] device hsr_slave_0 entered promiscuous mode [ 85.112991][ T6631] device hsr_slave_1 entered promiscuous mode [ 85.204799][ T6631] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 85.233811][ T6631] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 85.303625][ T6631] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 85.353673][ T6631] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 85.427495][ T6631] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.434555][ T6631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.441754][ T6631] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.448769][ T6631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.465205][ T6631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.473847][ T6200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.481312][ T6200] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.489269][ T6200] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.497001][ T6200] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 85.505835][ T6631] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.513912][ T3897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.522020][ T3897] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.529051][ T3897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.537598][ T6195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.546417][ T6195] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.553450][ T6195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.564256][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 85.572553][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.583002][ T6195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.591423][ T6195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.600499][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.609457][ T6631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 85.619521][ T6195] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 85.626979][ T6195] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 85.636086][ T6631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.646349][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 85.658243][ T6631] device veth0_vlan entered promiscuous mode [ 85.664979][ T6200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.673146][ T6200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.680490][ T6200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.689813][ T6631] device veth1_vlan entered promiscuous mode [ 85.700153][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 85.707937][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 85.715751][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 85.724840][ T6631] device veth0_macvtap entered promiscuous mode [ 85.732041][ T6631] device veth1_macvtap entered promiscuous mode [ 85.741329][ T6631] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 85.748560][ T6200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 85.756885][ T6200] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 85.765538][ T6631] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 85.773104][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 85.781298][ T6834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/05/01 09:24:55 executed programs: 1 2020/05/01 09:25:00 executed programs: 3 2020/05/01 09:25:06 executed programs: 5 2020/05/01 09:25:12 executed programs: 7 2020/05/01 09:25:17 executed programs: 9 [ 115.348630][ T0] NOHZ: local_softirq_pending 08 2020/05/01 09:25:23 executed programs: 11 2020/05/01 09:25:29 executed programs: 13 2020/05/01 09:25:34 executed programs: 15 [ 136.367513][ T6902] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881134eb240 (size 2200): comm "syz-executor.0", pid 6871, jiffies 4294947542 (age 35.990s) hex dump (first 32 bytes): ac 14 14 bb ac 14 14 0a d1 fd c2 ef 40 01 00 00 ............@... 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000ffcb4c75>] sk_prot_alloc+0x3c/0x170 [<0000000025a5b3c0>] sk_alloc+0x30/0x330 [<000000006b3e30c5>] inet_create+0x119/0x450 [<0000000076e07524>] __sock_create+0x14a/0x220 [<00000000c13c800c>] __sys_socket+0x60/0x110 [<000000009d0bca60>] __x64_sys_socket+0x1a/0x20 [<0000000004f3905c>] do_syscall_64+0x6e/0x220 [<0000000076c5240e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881158d51a0 (size 32): comm "syz-executor.0", pid 6871, jiffies 4294947542 (age 35.990s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 80 bc 3f 17 81 88 ff ff ..........?..... 01 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ backtrace: [<000000003c4ae272>] selinux_sk_alloc_security+0x43/0xa0 [<000000001d35a6f7>] security_sk_alloc+0x42/0x70 [<0000000045b211d5>] sk_prot_alloc+0x9c/0x170 [<0000000025a5b3c0>] sk_alloc+0x30/0x330 [<000000006b3e30c5>] inet_create+0x119/0x450 [<0000000076e07524>] __sock_create+0x14a/0x220 [<00000000c13c800c>] __sys_socket+0x60/0x110 [<000000009d0bca60>] __x64_sys_socket+0x1a/0x20 [<0000000004f3905c>] do_syscall_64+0x6e/0x220 [<0000000076c5240e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881173fbc80 (size 64): comm "syz-executor.0", pid 6871, jiffies 4294947542 (age 35.990s) hex dump (first 32 bytes): 15 00 00 01 00 00 00 00 80 66 41 18 81 88 ff ff .........fA..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bc6ade11>] selinux_netlbl_sock_genattr+0x48/0x180 [<00000000e0da783f>] selinux_netlbl_socket_post_create+0x41/0xb0 [<00000000f9b81acd>] selinux_socket_post_create+0x182/0x390 [<00000000f475d5ec>] security_socket_post_create+0x54/0x80 [<00000000ccf658f7>] __sock_create+0x1cc/0x220 [<00000000c13c800c>] __sys_socket+0x60/0x110 [<000000009d0bca60>] __x64_sys_socket+0x1a/0x20 [<0000000004f3905c>] do_syscall_64+0x6e/0x220 [<0000000076c5240e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118416680 (size 32): comm "syz-executor.0", pid 6871, jiffies 4294947542 (age 35.990s) hex dump (first 32 bytes): 6b 65 72 6e 65 6c 5f 74 00 73 79 73 74 65 6d 5f kernel_t.system_ 72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00 r:kernel_t:s0... backtrace: [<0000000037a05df4>] kstrdup+0x36/0x70 [<00000000f42b45e2>] security_netlbl_sid_to_secattr+0x97/0x100 [<0000000019f016aa>] selinux_netlbl_sock_genattr+0x67/0x180 [<00000000e0da783f>] selinux_netlbl_socket_post_create+0x41/0xb0 [<00000000f9b81acd>] selinux_socket_post_create+0x182/0x390 [<00000000f475d5ec>] security_socket_post_create+0x54/0x80 [<00000000ccf658f7>] __sock_create+0x1cc/0x220 [<00000000c13c800c>] __sys_socket+0x60/0x110 [<000000009d0bca60>] __x64_sys_socket+0x1a/0x20 [<0000000004f3905c>] do_syscall_64+0x6e/0x220 [<0000000076c5240e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118c07400 (size 512): comm "syz-executor.0", pid 6871, jiffies 4294947542 (age 35.990s) hex dump (first 32 bytes): 40 b2 4e 13 81 88 ff ff 00 00 00 00 00 00 00 00 @.N............. 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 ................ backtrace: [<000000006c498ca5>] sk_psock_init+0x2a/0x180 [<000000003a49e0e4>] sock_map_link.isra.0+0x469/0x4f0 [<0000000042748b19>] sock_map_update_common+0xa1/0x3c0 [<000000001d62057c>] sock_map_update_elem+0x1e9/0x220 [<000000006788549e>] bpf_map_update_value.isra.0+0x141/0x2f0 [<00000000718aae23>] __do_sys_bpf+0x15e0/0x1f60 [<0000000004f3905c>] do_syscall_64+0x6e/0x220 [<0000000076c5240e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9