[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.179' (ECDSA) to the list of known hosts. 2020/09/01 22:03:18 parsed 1 programs syzkaller login: [ 550.999332][ T3671] kmemleak: Automatic memory scanning thread ended 2020/09/01 22:03:26 executed programs: 0 [ 558.353225][ T25] audit: type=1400 audit(1598997806.410:8): avc: denied { execmem } for pid=6509 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 559.392417][ T6510] IPVS: ftp: loaded support on port[0] = 21 [ 559.442223][ T6510] chnl_net:caif_netlink_parms(): no params data found [ 559.494325][ T6510] bridge0: port 1(bridge_slave_0) entered blocking state [ 559.501428][ T6510] bridge0: port 1(bridge_slave_0) entered disabled state [ 559.508608][ T6510] device bridge_slave_0 entered promiscuous mode [ 559.515912][ T6510] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.522976][ T6510] bridge0: port 2(bridge_slave_1) entered disabled state [ 559.530155][ T6510] device bridge_slave_1 entered promiscuous mode [ 559.539935][ T6510] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 559.549533][ T6510] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 559.561651][ T6510] team0: Port device team_slave_0 added [ 559.567623][ T6510] team0: Port device team_slave_1 added [ 559.576129][ T6510] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 559.583059][ T6510] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 559.608897][ T6510] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 559.619735][ T6510] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 559.626752][ T6510] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 559.652602][ T6510] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 559.667808][ T6510] device hsr_slave_0 entered promiscuous mode [ 559.674041][ T6510] device hsr_slave_1 entered promiscuous mode [ 559.700319][ T6510] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 559.707857][ T6510] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 559.715318][ T6510] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 559.722567][ T6510] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 559.733722][ T6510] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.740842][ T6510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 559.748375][ T6510] bridge0: port 1(bridge_slave_0) entered blocking state [ 559.755396][ T6510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 559.771586][ T6510] 8021q: adding VLAN 0 to HW filter on device bond0 [ 559.779829][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 559.788077][ T2812] bridge0: port 1(bridge_slave_0) entered disabled state [ 559.795662][ T2812] bridge0: port 2(bridge_slave_1) entered disabled state [ 559.803043][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 559.811391][ T6510] 8021q: adding VLAN 0 to HW filter on device team0 [ 559.821100][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 559.829187][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 559.836195][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 559.843558][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 559.851717][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.858729][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 559.870942][ T6510] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 559.881331][ T6510] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 559.892314][ T6727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 559.900379][ T6727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 559.908492][ T6727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 559.916448][ T6727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 559.924433][ T6727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 559.931819][ T6727] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 559.942994][ T6510] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 559.950968][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 559.958256][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 559.970926][ T6510] device veth0_vlan entered promiscuous mode [ 559.978252][ T6510] device veth1_vlan entered promiscuous mode [ 559.984833][ T6488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 559.993268][ T6488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 560.001172][ T6488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 560.008465][ T6488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 560.015947][ T6488] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 560.027549][ T6727] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 560.035339][ T6727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 560.044160][ T6510] device veth0_macvtap entered promiscuous mode [ 560.051616][ T6510] device veth1_macvtap entered promiscuous mode [ 560.060678][ T6510] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 560.068023][ T6488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 560.076366][ T6488] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 560.085287][ T6510] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 560.092693][ T6727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 560.101872][ T6510] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 560.110518][ T6510] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 560.119360][ T6510] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 560.128021][ T6510] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 561.440789][ T6727] Bluetooth: hci0: command 0x0409 tx timeout [ 563.520466][ T6488] Bluetooth: hci0: command 0x041b tx timeout 2020/09/01 22:03:33 executed programs: 1 [ 565.600205][ T6488] Bluetooth: hci0: command 0x040f tx timeout [ 567.679960][ T2812] Bluetooth: hci0: command 0x0419 tx timeout 2020/09/01 22:03:39 executed programs: 3 2020/09/01 22:03:44 executed programs: 5 2020/09/01 22:03:50 executed programs: 7 2020/09/01 22:03:55 executed programs: 9 2020/09/01 22:04:01 executed programs: 11 2020/09/01 22:04:06 executed programs: 13 2020/09/01 22:04:11 executed programs: 15 [ 605.150864][ T6873] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881138e7900 (size 224): comm "syz-executor.0", pid 6850, jiffies 4294997125 (age 13.030s) hex dump (first 32 bytes): a0 f4 ea 13 81 88 ff ff a0 f4 ea 13 81 88 ff ff ................ 00 40 0f 13 81 88 ff ff 00 00 00 00 00 00 00 00 .@.............. backtrace: [<0000000078c9ee6f>] __build_skb+0x1f/0x100 [<000000002ce2085c>] __napi_alloc_skb+0xe5/0x140 [<000000007832c029>] napi_get_frags+0x3a/0x70 [<0000000055dab830>] tun_get_user+0xa43/0x1660 [<0000000050eefb48>] tun_chr_write_iter+0x66/0xa0 [<0000000094684a0e>] do_iter_readv_writev+0x207/0x2d0 [<00000000d8ab9cc9>] do_iter_write+0xac/0x230 [<00000000de1c47b8>] vfs_writev+0xc1/0x120 [<0000000073c093d2>] do_writev+0x83/0x170 [<0000000072b81f99>] do_syscall_64+0x2d/0x70 [<000000006b4868bf>] entry_SYSCALL_64_after_hwframe+0x44/0xa9