[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.106' (ECDSA) to the list of known hosts. 2020/11/30 22:22:29 parsed 1 programs 2020/11/30 22:22:36 executed programs: 0 syzkaller login: [ 182.817072][ T8522] IPVS: ftp: loaded support on port[0] = 21 [ 182.878584][ T8522] chnl_net:caif_netlink_parms(): no params data found [ 182.899927][ T8522] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.907467][ T8522] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.916683][ T8522] device bridge_slave_0 entered promiscuous mode [ 182.923673][ T8522] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.930735][ T8522] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.938308][ T8522] device bridge_slave_1 entered promiscuous mode [ 182.949304][ T8522] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.959195][ T8522] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.972275][ T8522] team0: Port device team_slave_0 added [ 182.978731][ T8522] team0: Port device team_slave_1 added [ 182.987907][ T8522] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 182.994840][ T8522] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.020894][ T8522] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.032035][ T8522] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.038996][ T8522] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.065006][ T8522] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 183.080510][ T8522] device hsr_slave_0 entered promiscuous mode [ 183.086785][ T8522] device hsr_slave_1 entered promiscuous mode [ 183.115281][ T8522] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 183.123173][ T8522] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 183.131155][ T8522] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 183.139057][ T8522] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 183.151377][ T8522] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.158848][ T8522] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.166072][ T8522] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.173119][ T8522] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.191987][ T8522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.201102][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.209237][ T4908] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.216829][ T4908] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.224275][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 183.233968][ T8522] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.242268][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.250650][ T4908] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.257704][ T4908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.266544][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.274696][ T3628] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.281755][ T3628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.293335][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.301741][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.311214][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.322215][ T8522] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 183.332889][ T8522] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 183.344601][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.353082][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.365671][ T8522] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.373301][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.381245][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.388955][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.404515][ T8522] device veth0_vlan entered promiscuous mode [ 183.411074][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.419581][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.427658][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.435022][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.444654][ T8522] device veth1_vlan entered promiscuous mode [ 183.457878][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 183.465550][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 183.473853][ T4908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.483197][ T8522] device veth0_macvtap entered promiscuous mode [ 183.490880][ T8522] device veth1_macvtap entered promiscuous mode [ 183.501567][ T8522] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 183.509084][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.517769][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 183.527508][ T8522] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 183.535931][ T8522] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.544696][ T8522] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.553735][ T8522] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.562538][ T8522] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.572027][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.599699][ T1175] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 183.612195][ T1175] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 183.620067][ T26] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 183.620515][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 183.637230][ T26] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 183.644628][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 184.886203][ T4908] Bluetooth: hci0: command 0x0409 tx timeout [ 186.956133][ T4908] Bluetooth: hci0: command 0x041b tx timeout [ 189.046105][ T4876] Bluetooth: hci0: command 0x040f tx timeout 2020/11/30 22:22:44 executed programs: 1 [ 190.580709][ T8776] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 191.125979][ T4876] Bluetooth: hci0: command 0x0419 tx timeout [ 196.909574][ T8776] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810184d9c0 (size 32): comm "syz-executor.0", pid 8761, jiffies 4294955630 (age 13.310s) hex dump (first 32 bytes): 25 5e 5d 37 5b 2b 25 5d 28 24 7b 3a 0f 6b 5b 29 %^]7[+%](${:.k[) 2d 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -:.............. backtrace: [<00000000afb61938>] kmemdup_nul+0x2d/0x70 [<0000000034a9c15e>] vfs_parse_fs_string+0x6e/0xd0 [<00000000ff71ba13>] generic_parse_monolithic+0xe0/0x130 [<00000000ce78c3d2>] path_mount+0xbbb/0x1170 [<0000000096c208f5>] __x64_sys_mount+0x18e/0x1d0 [<00000000d38c3187>] do_syscall_64+0x2d/0x70 [<000000003784af98>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810f4872a0 (size 32): comm "syz-executor.0", pid 8770, jiffies 4294956190 (age 7.710s) hex dump (first 32 bytes): 25 5e 5d 37 5b 2b 25 5d 28 24 7b 3a 0f 6b 5b 29 %^]7[+%](${:.k[) 2d 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -:.............. backtrace: [<00000000afb61938>] kmemdup_nul+0x2d/0x70 [<0000000034a9c15e>] vfs_parse_fs_string+0x6e/0xd0 [<00000000ff71ba13>] generic_parse_monolithic+0xe0/0x130 [<00000000ce78c3d2>] path_mount+0xbbb/0x1170 [<0000000096c208f5>] __x64_sys_mount+0x18e/0x1d0 [<00000000d38c3187>] do_syscall_64+0x2d/0x70 [<000000003784af98>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810f487100 (size 32): comm "syz-executor.0", pid 8773, jiffies 4294956191 (age 7.700s) hex dump (first 32 bytes): 25 5e 5d 37 5b 2b 25 5d 28 24 7b 3a 0f 6b 5b 29 %^]7[+%](${:.k[) 2d 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -:.............. backtrace: [<00000000afb61938>] kmemdup_nul+0x2d/0x70 [<0000000034a9c15e>] vfs_parse_fs_string+0x6e/0xd0 [<00000000ff71ba13>] generic_parse_monolithic+0xe0/0x130 [<00000000ce78c3d2>] path_mount+0xbbb/0x1170 [<0000000096c208f5>] __x64_sys_mount+0x18e/0x1d0 [<00000000d38c3187>] do_syscall_64+0x2d/0x70 [<000000003784af98>] entry_SYSCALL_64_after_hwframe+0x44/0xa9