[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.20' (ECDSA) to the list of known hosts. 2020/05/09 23:39:32 parsed 1 programs syzkaller login: [ 69.069492][ T3830] kmemleak: Automatic memory scanning thread ended 2020/05/09 23:39:39 executed programs: 0 [ 76.513223][ T25] audit: type=1400 audit(1589067579.606:8): avc: denied { execmem } for pid=6634 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 76.534784][ T6635] IPVS: ftp: loaded support on port[0] = 21 [ 76.559480][ T6635] chnl_net:caif_netlink_parms(): no params data found [ 76.607006][ T6635] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.614453][ T6635] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.621649][ T6635] device bridge_slave_0 entered promiscuous mode [ 76.628970][ T6635] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.636067][ T6635] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.643507][ T6635] device bridge_slave_1 entered promiscuous mode [ 76.653003][ T6635] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.662534][ T6635] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.674619][ T6635] team0: Port device team_slave_0 added [ 76.680635][ T6635] team0: Port device team_slave_1 added [ 76.690126][ T6635] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 76.697076][ T6635] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.723118][ T6635] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 76.734058][ T6635] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 76.740988][ T6635] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.766921][ T6635] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 76.803838][ T6635] device hsr_slave_0 entered promiscuous mode [ 76.833140][ T6635] device hsr_slave_1 entered promiscuous mode [ 76.942381][ T6635] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 76.974086][ T6635] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 77.023800][ T6635] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 77.063775][ T6635] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 77.117612][ T6635] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.124696][ T6635] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.131879][ T6635] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.138951][ T6635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.155613][ T6635] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.164098][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.171701][ T16] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.179288][ T16] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.187413][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 77.195978][ T6635] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.203971][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.212173][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.219193][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.227555][ T3889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.235956][ T3889] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.242972][ T3889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.253526][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.261530][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.270111][ T3889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.279322][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.288822][ T6635] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 77.299451][ T6635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.306967][ T3889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.318741][ T6635] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.325897][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.333303][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.343930][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 77.355735][ T6635] device veth0_vlan entered promiscuous mode [ 77.364085][ T3584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.371927][ T3584] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.380199][ T3584] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 77.388292][ T6635] device veth1_vlan entered promiscuous mode [ 77.398946][ T6635] device veth0_macvtap entered promiscuous mode [ 77.405694][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 77.413525][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 77.421212][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 77.429792][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 77.438447][ T6635] device veth1_macvtap entered promiscuous mode [ 77.447811][ T6635] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 77.455278][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 77.464703][ T6635] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.473364][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/05/09 23:39:46 executed programs: 1 2020/05/09 23:39:51 executed programs: 3 2020/05/09 23:39:57 executed programs: 5 2020/05/09 23:40:03 executed programs: 7 [ 101.245966][ T6882] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 107.560029][ T0] NOHZ: local_softirq_pending 08 BUG: memory leak unreferenced object 0xffff8881179752c0 (size 2200): comm "syz-executor.0", pid 6875, jiffies 4294946718 (age 13.410s) hex dump (first 32 bytes): ac 14 14 bb ac 14 14 0a 0a 65 4a 12 40 01 00 00 .........eJ.@... 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000058276056>] sk_prot_alloc+0x3c/0x170 [<00000000d69fe168>] sk_alloc+0x30/0x330 [<0000000000801138>] inet_create+0x119/0x450 [<0000000025f19a44>] __sock_create+0x14a/0x220 [<000000009b7ddd5b>] __sys_socket+0x60/0x110 [<00000000b632b15b>] __x64_sys_socket+0x1a/0x20 [<000000005341c88a>] do_syscall_64+0x6e/0x220 [<00000000b70d208d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811b6807c0 (size 32): comm "syz-executor.0", pid 6875, jiffies 4294946718 (age 13.410s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 c0 5a 4e 14 81 88 ff ff .........ZN..... 01 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ backtrace: [<00000000d67fdc57>] selinux_sk_alloc_security+0x43/0xa0 [<0000000081fc008e>] security_sk_alloc+0x42/0x70 [<00000000aabdc4f0>] sk_prot_alloc+0x9c/0x170 [<00000000d69fe168>] sk_alloc+0x30/0x330 [<0000000000801138>] inet_create+0x119/0x450 [<0000000025f19a44>] __sock_create+0x14a/0x220 [<000000009b7ddd5b>] __sys_socket+0x60/0x110 [<00000000b632b15b>] __x64_sys_socket+0x1a/0x20 [<000000005341c88a>] do_syscall_64+0x6e/0x220 [<00000000b70d208d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881144e5ac0 (size 64): comm "syz-executor.0", pid 6875, jiffies 4294946718 (age 13.410s) hex dump (first 32 bytes): 15 00 00 01 00 00 00 00 80 b5 6d 1b 81 88 ff ff ..........m..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000058f0e924>] selinux_netlbl_sock_genattr+0x48/0x180 [<00000000237fa126>] selinux_netlbl_socket_post_create+0x41/0xb0 [<000000007f930e69>] selinux_socket_post_create+0x182/0x390 [<00000000032c09c3>] security_socket_post_create+0x54/0x80 [<0000000034895694>] __sock_create+0x1cc/0x220 [<000000009b7ddd5b>] __sys_socket+0x60/0x110 [<00000000b632b15b>] __x64_sys_socket+0x1a/0x20 [<000000005341c88a>] do_syscall_64+0x6e/0x220 [<00000000b70d208d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811b6db580 (size 32): comm "syz-executor.0", pid 6875, jiffies 4294946718 (age 13.410s) hex dump (first 32 bytes): 6b 65 72 6e 65 6c 5f 74 00 73 79 73 74 65 6d 5f kernel_t.system_ 72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00 r:kernel_t:s0... backtrace: [<00000000dbc3681a>] kstrdup+0x36/0x70 [<000000003fd9b30d>] security_netlbl_sid_to_secattr+0x97/0x100 [<0000000040a8b7af>] selinux_netlbl_sock_genattr+0x67/0x180 [<00000000237fa126>] selinux_netlbl_socket_post_create+0x41/0xb0 [<000000007f930e69>] selinux_socket_post_create+0x182/0x390 [<00000000032c09c3>] security_socket_post_create+0x54/0x80 [<0000000034895694>] __sock_create+0x1cc/0x220 [<000000009b7ddd5b>] __sys_socket+0x60/0x110 [<00000000b632b15b>] __x64_sys_socket+0x1a/0x20 [<000000005341c88a>] do_syscall_64+0x6e/0x220 [<00000000b70d208d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811cb69400 (size 512): comm "syz-executor.0", pid 6875, jiffies 4294946718 (age 13.410s) hex dump (first 32 bytes): c0 52 97 17 81 88 ff ff 00 00 00 00 00 00 00 00 .R.............. 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 ................ backtrace: [<00000000cf95277a>] sk_psock_init+0x2a/0x180 [<00000000d05c8c89>] sock_map_link.isra.0+0x469/0x4f0 [<0000000005a7c312>] sock_map_update_common+0xa1/0x3c0 [<00000000ce8b8466>] sock_map_update_elem+0x1e9/0x220 [<00000000777e7fb0>] bpf_map_update_value.isra.0+0x141/0x2f0 [<0000000011818d7b>] __do_sys_bpf+0x15e0/0x1f60 [<000000005341c88a>] do_syscall_64+0x6e/0x220 [<00000000b70d208d>] entry_SYSCALL_64_after_hwframe+0x44/0xa9