[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.108' (ECDSA) to the list of known hosts. 2020/11/29 10:42:28 parsed 1 programs 2020/11/29 10:42:36 executed programs: 0 syzkaller login: [ 1078.424785][ T8499] IPVS: ftp: loaded support on port[0] = 21 [ 1078.482325][ T8499] chnl_net:caif_netlink_parms(): no params data found [ 1078.505516][ T8499] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.512640][ T8499] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.520074][ T8499] device bridge_slave_0 entered promiscuous mode [ 1078.527031][ T8499] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.534095][ T8499] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.541529][ T8499] device bridge_slave_1 entered promiscuous mode [ 1078.552150][ T8499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1078.561992][ T8499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1078.574349][ T8499] team0: Port device team_slave_0 added [ 1078.580531][ T8499] team0: Port device team_slave_1 added [ 1078.589259][ T8499] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1078.596327][ T8499] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1078.622496][ T8499] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1078.633653][ T8499] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1078.640865][ T8499] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1078.666883][ T8499] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1078.681873][ T8499] device hsr_slave_0 entered promiscuous mode [ 1078.688286][ T8499] device hsr_slave_1 entered promiscuous mode [ 1078.715894][ T8499] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1078.723615][ T8499] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1078.731202][ T8499] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1078.738628][ T8499] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1078.750886][ T8499] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.757926][ T8499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1078.765117][ T8499] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.772133][ T8499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1078.790006][ T8499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1078.799248][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1078.806793][ T8469] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.814462][ T8469] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.822246][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1078.831017][ T8499] 8021q: adding VLAN 0 to HW filter on device team0 [ 1078.839006][ T8719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1078.847086][ T8719] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.854108][ T8719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1078.862706][ T8477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1078.871073][ T8477] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.878094][ T8477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1078.889138][ T8719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1078.897717][ T8719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1078.906691][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1078.917383][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1078.925277][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1078.934107][ T8499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1078.944682][ T8477] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1078.952183][ T8477] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1078.961439][ T8499] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1078.972684][ T8477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1078.984533][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1078.992664][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1079.000248][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1079.008772][ T8499] device veth0_vlan entered promiscuous mode [ 1079.016695][ T8499] device veth1_vlan entered promiscuous mode [ 1079.028141][ T8477] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1079.035809][ T8477] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1079.043848][ T8477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1079.053177][ T8499] device veth0_macvtap entered promiscuous mode [ 1079.060740][ T8499] device veth1_macvtap entered promiscuous mode [ 1079.070939][ T8499] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1079.078360][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1079.086823][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1079.095755][ T8499] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1079.103557][ T8719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1079.112908][ T8499] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.121649][ T8499] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.130488][ T8499] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.139185][ T8499] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.166704][ T8641] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1079.174557][ T8641] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1079.185089][ T3084] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1079.185714][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1079.196349][ T3084] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1079.207684][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1080.497240][ T17] Bluetooth: hci0: command 0x0409 tx timeout [ 1082.576864][ T17] Bluetooth: hci0: command 0x041b tx timeout 2020/11/29 10:42:43 executed programs: 1 [ 1084.656800][ T8760] Bluetooth: hci0: command 0x040f tx timeout [ 1085.497413][ T8754] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1086.736454][ T8477] Bluetooth: hci0: command 0x0419 tx timeout [ 1091.627177][ T8754] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881159f5460 (size 32): comm "syz-executor.0", pid 8739, jiffies 4295045192 (age 12.470s) hex dump (first 32 bytes): 25 5e 5d 37 5b 2b 25 5d 28 24 7b 3a 0f 6b 5b 31 %^]7[+%](${:.k[1 2d 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -:.............. backtrace: [<000000008ea53932>] kmemdup_nul+0x2d/0x70 [<00000000fffbc9fb>] vfs_parse_fs_string+0x6e/0xd0 [<0000000050d02500>] generic_parse_monolithic+0xe0/0x130 [<000000005069cf5d>] path_mount+0xbbb/0x1170 [<000000000b27e62a>] __x64_sys_mount+0x18e/0x1d0 [<0000000065c29a4f>] do_syscall_64+0x2d/0x70 [<000000000fa0bd33>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881159f51e0 (size 32): comm "syz-executor.0", pid 8748, jiffies 4295045714 (age 7.250s) hex dump (first 32 bytes): 25 5e 5d 37 5b 2b 25 5d 28 24 7b 3a 0f 6b 5b 31 %^]7[+%](${:.k[1 2d 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -:.............. backtrace: [<000000008ea53932>] kmemdup_nul+0x2d/0x70 [<00000000fffbc9fb>] vfs_parse_fs_string+0x6e/0xd0 [<0000000050d02500>] generic_parse_monolithic+0xe0/0x130 [<000000005069cf5d>] path_mount+0xbbb/0x1170 [<000000000b27e62a>] __x64_sys_mount+0x18e/0x1d0 [<0000000065c29a4f>] do_syscall_64+0x2d/0x70 [<000000000fa0bd33>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881159f5520 (size 32): comm "syz-executor.0", pid 8752, jiffies 4295045715 (age 7.240s) hex dump (first 32 bytes): 25 5e 5d 37 5b 2b 25 5d 28 24 7b 3a 0f 6b 5b 31 %^]7[+%](${:.k[1 2d 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -:.............. backtrace: [<000000008ea53932>] kmemdup_nul+0x2d/0x70 [<00000000fffbc9fb>] vfs_parse_fs_string+0x6e/0xd0 [<0000000050d02500>] generic_parse_monolithic+0xe0/0x130 [<000000005069cf5d>] path_mount+0xbbb/0x1170 [<000000000b27e62a>] __x64_sys_mount+0x18e/0x1d0 [<0000000065c29a4f>] do_syscall_64+0x2d/0x70 [<000000000fa0bd33>] entry_SYSCALL_64_after_hwframe+0x44/0xa9