[ OK ] Started Regular background program processing daemon. Starting Permit User Sessions... [ OK ] Started Daily Cleanup of Temporary Directories. [ OK ] Reached target Timers. Starting getty on tty2-tty6 if dbus and logind are not available... [ OK ] Started System Logging Service. [ OK ] Found device /dev/ttyS0. [ OK ] Started Permit User Sessions. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Warning: Permanently added '10.128.0.64' (ECDSA) to the list of known hosts. Debian GNU/Linux 9 syzkaller ttyS0 2020/10/13 09:01:56 fuzzer started 2020/10/13 09:01:56 dialing manager at 10.128.0.26:39493 2020/10/13 09:01:56 syscalls: 3448 2020/10/13 09:01:56 code coverage: enabled 2020/10/13 09:01:56 comparison tracing: enabled 2020/10/13 09:01:56 extra coverage: enabled 2020/10/13 09:01:56 setuid sandbox: enabled 2020/10/13 09:01:56 namespace sandbox: enabled 2020/10/13 09:01:56 Android sandbox: enabled 2020/10/13 09:01:56 fault injection: enabled 2020/10/13 09:01:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/10/13 09:01:56 net packet injection: enabled 2020/10/13 09:01:56 net device setup: enabled 2020/10/13 09:01:56 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/10/13 09:01:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/10/13 09:01:56 USB emulation: enabled 2020/10/13 09:01:56 hci packet injection: enabled 2020/10/13 09:01:56 wifi device emulation: enabled syzkaller login: [ 78.164513][ C1] WARNING: can't access registers at asm_sysvec_call_function_single+0x12/0x20 09:02:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp\x00') r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) sendfile(r1, r0, 0x0, 0x9) [ 84.780549][ T28] audit: type=1400 audit(1602579726.173:8): avc: denied { execmem } for pid=6861 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 09:02:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef42a000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) 09:02:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a200000000d7e9e1568dbad43040000000000008f0900010073797a300000000070000000120a0100001000000000000000800000040004800900020073797a30000000000900011773797a3000000000080003"], 0xb8}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x9effffff, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 09:02:06 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380)='ethtool\x00') sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000003700)={&(0x7f0000003540)={0x20, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_HEADER={0x12, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 09:02:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000000007010800000000000000000c00000008000500000000010900010073"], 0x28}}, 0x0) 09:02:07 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) [ 86.157867][ T6862] IPVS: ftp: loaded support on port[0] = 21 [ 86.346852][ T6864] IPVS: ftp: loaded support on port[0] = 21 [ 86.640964][ T6866] IPVS: ftp: loaded support on port[0] = 21 [ 86.673563][ T6862] chnl_net:caif_netlink_parms(): no params data found [ 86.859557][ T6868] IPVS: ftp: loaded support on port[0] = 21 [ 87.093434][ T6870] IPVS: ftp: loaded support on port[0] = 21 [ 87.141334][ T6864] chnl_net:caif_netlink_parms(): no params data found [ 87.167432][ T6862] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.176716][ T6862] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.189597][ T6862] device bridge_slave_0 entered promiscuous mode [ 87.259910][ T6862] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.297649][ T6862] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.335029][ T6862] device bridge_slave_1 entered promiscuous mode [ 87.479960][ T6883] IPVS: ftp: loaded support on port[0] = 21 [ 87.480239][ T6866] chnl_net:caif_netlink_parms(): no params data found [ 87.528237][ T6862] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.591345][ T6862] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.713272][ T6862] team0: Port device team_slave_0 added [ 87.763934][ T6862] team0: Port device team_slave_1 added [ 87.853622][ T6864] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.861126][ T6864] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.869790][ T6864] device bridge_slave_0 entered promiscuous mode [ 87.883468][ T6864] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.890730][ T6864] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.899540][ T6864] device bridge_slave_1 entered promiscuous mode [ 87.952125][ T6868] chnl_net:caif_netlink_parms(): no params data found [ 87.966406][ T6862] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 87.973403][ T6862] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 88.001232][ T6862] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 88.065463][ T2640] Bluetooth: hci0: command 0x0409 tx timeout [ 88.101156][ T6862] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 88.109158][ T6862] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 88.135534][ T6862] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 88.147757][ T6866] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.155785][ T6866] bridge0: port 1(bridge_slave_0) entered disabled state