Warning: Permanently added '10.128.0.197' (ECDSA) to the list of known hosts. 2020/12/13 11:24:57 parsed 1 programs 2020/12/13 11:25:04 executed programs: 0 syzkaller login: [ 183.775057][ T8499] IPVS: ftp: loaded support on port[0] = 21 [ 183.834631][ T8499] chnl_net:caif_netlink_parms(): no params data found [ 183.856924][ T8499] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.864016][ T8499] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.871509][ T8499] device bridge_slave_0 entered promiscuous mode [ 183.878320][ T8499] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.885360][ T8499] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.892705][ T8499] device bridge_slave_1 entered promiscuous mode [ 183.902658][ T8499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.912457][ T8499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.925051][ T8499] team0: Port device team_slave_0 added [ 183.931462][ T8499] team0: Port device team_slave_1 added [ 183.940319][ T8499] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 183.947239][ T8499] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.973157][ T8499] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.984145][ T8499] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.991342][ T8499] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.017210][ T8499] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 184.032225][ T8499] device hsr_slave_0 entered promiscuous mode [ 184.038412][ T8499] device hsr_slave_1 entered promiscuous mode [ 184.066374][ T8499] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 184.073863][ T8499] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 184.081534][ T8499] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 184.088925][ T8499] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 184.100373][ T8499] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.107383][ T8499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.114601][ T8499] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.121639][ T8499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.139907][ T8499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.148657][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.156186][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.163725][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.171340][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 184.180161][ T8499] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.189207][ T3752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.197303][ T3752] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.204409][ T3752] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.211994][ T3752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.220594][ T3752] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.227596][ T3752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.238825][ T8718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.246927][ T8718] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.255793][ T3752] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.265007][ T8718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.274023][ T3752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.282810][ T8499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.293323][ T8718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.300818][ T8718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.310109][ T8499] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.321056][ T3752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.333587][ T8499] device veth0_vlan entered promiscuous mode [ 184.339810][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.347696][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.355373][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.364707][ T8499] device veth1_vlan entered promiscuous mode [ 184.376009][ T3752] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 184.383662][ T3752] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 184.391459][ T3752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.400642][ T8499] device veth0_macvtap entered promiscuous mode [ 184.408121][ T8499] device veth1_macvtap entered promiscuous mode [ 184.418098][ T8499] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 184.425348][ T8720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.433917][ T8720] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 184.443123][ T8499] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 184.450636][ T8720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 184.459892][ T8499] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.468820][ T8499] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.477487][ T8499] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.486160][ T8499] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.517622][ T119] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 184.526799][ T119] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 184.530817][ T8220] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 184.543059][ T8220] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 184.548689][ T3752] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 184.558071][ T3752] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 185.838776][ T8720] Bluetooth: hci0: command 0x0409 tx timeout [ 187.918545][ T8720] Bluetooth: hci0: command 0x041b tx timeout 2020/12/13 11:25:12 executed programs: 1 [ 189.999783][ T17] Bluetooth: hci0: command 0x040f tx timeout [ 192.078396][ T8720] Bluetooth: hci0: command 0x0419 tx timeout 2020/12/13 11:25:17 executed programs: 3 [ 196.024302][ T8753] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 202.237114][ T8753] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810dc38240 (size 64): comm "syz-executor.0", pid 8746, jiffies 4294956243 (age 12.510s) hex dump (first 32 bytes): 07 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 ................ 00 d0 8d 0e 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3ec6daf>] xskq_create+0x23/0xd0 [<000000002c1acbda>] xsk_setsockopt+0x1c4/0x590 [<000000005780e602>] __sys_setsockopt+0x1b0/0x360 [<000000003720337e>] __x64_sys_setsockopt+0x22/0x30 [<00000000591eda32>] do_syscall_64+0x2d/0x70 [<000000002fda543e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810dc38380 (size 64): comm "syz-executor.0", pid 8746, jiffies 4294956243 (age 12.510s) hex dump (first 32 bytes): 7f 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 ................ 00 90 a7 0f 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3ec6daf>] xskq_create+0x23/0xd0 [<000000002c1acbda>] xsk_setsockopt+0x1c4/0x590 [<000000005780e602>] __sys_setsockopt+0x1b0/0x360 [<000000003720337e>] __x64_sys_setsockopt+0x22/0x30 [<00000000591eda32>] do_syscall_64+0x2d/0x70 [<000000002fda543e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810c83ca80 (size 64): comm "syz-executor.0", pid 8752, jiffies 4294956758 (age 7.360s) hex dump (first 32 bytes): 07 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 ................ 00 20 8a 0e 81 88 ff ff 00 00 00 00 00 00 00 00 . .............. backtrace: [<00000000f3ec6daf>] xskq_create+0x23/0xd0 [<000000002c1acbda>] xsk_setsockopt+0x1c4/0x590 [<000000005780e602>] __sys_setsockopt+0x1b0/0x360 [<000000003720337e>] __x64_sys_setsockopt+0x22/0x30 [<00000000591eda32>] do_syscall_64+0x2d/0x70 [<000000002fda543e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810c83ca00 (size 64): comm "syz-executor.0", pid 8752, jiffies 4294956758 (age 7.360s) hex dump (first 32 bytes): 7f 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 88 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f3ec6daf>] xskq_create+0x23/0xd0 [<000000002c1acbda>] xsk_setsockopt+0x1c4/0x590 [<000000005780e602>] __sys_setsockopt+0x1b0/0x360 [<000000003720337e>] __x64_sys_setsockopt+0x22/0x30 [<00000000591eda32>] do_syscall_64+0x2d/0x70 [<000000002fda543e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9