Warning: Permanently added '10.128.0.14' (ECDSA) to the list of known hosts. 2021/06/30 14:27:49 parsed 1 programs 2021/06/30 14:27:56 executed programs: 0 syzkaller login: [ 296.179167][ T8414] chnl_net:caif_netlink_parms(): no params data found [ 296.204153][ T8414] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.211620][ T8414] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.219107][ T8414] device bridge_slave_0 entered promiscuous mode [ 296.227066][ T8414] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.234248][ T8414] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.242058][ T8414] device bridge_slave_1 entered promiscuous mode [ 296.252573][ T8414] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 296.262808][ T8414] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 296.275638][ T8414] team0: Port device team_slave_0 added [ 296.282207][ T8414] team0: Port device team_slave_1 added [ 296.291374][ T8414] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 296.298862][ T8414] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 296.324993][ T8414] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 296.336720][ T8414] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 296.343915][ T8414] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 296.370648][ T8414] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 296.386658][ T8414] device hsr_slave_0 entered promiscuous mode [ 296.393073][ T8414] device hsr_slave_1 entered promiscuous mode [ 296.421869][ T8414] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 296.429432][ T8414] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 296.437601][ T8414] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 296.445194][ T8414] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 296.457265][ T8414] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.464436][ T8414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.472297][ T8414] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.479441][ T8414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.497842][ T8414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.506808][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.514450][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.522309][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.530379][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 296.539209][ T8414] 8021q: adding VLAN 0 to HW filter on device team0 [ 296.547435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.556009][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.563156][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.578085][ T4837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.586376][ T4837] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.593378][ T4837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.601351][ T4837] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 296.609687][ T4837] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.618205][ T4837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.626188][ T4837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.635180][ T8414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.643029][ T3800] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.656000][ T8414] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.666634][ T4837] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.674314][ T4837] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.683823][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.695716][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.703933][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.711775][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.720852][ T8414] device veth0_vlan entered promiscuous mode [ 296.729138][ T8414] device veth1_vlan entered promiscuous mode [ 296.740778][ T8633] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 296.748673][ T8633] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 296.756939][ T8633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.766380][ T8414] device veth0_macvtap entered promiscuous mode [ 296.774105][ T8414] device veth1_macvtap entered promiscuous mode [ 296.784611][ T8414] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 296.792039][ T3212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.800685][ T3212] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 296.810555][ T8414] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 296.818134][ T8633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.827759][ T8414] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.836834][ T8414] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.845544][ T8414] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.854635][ T8414] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.887932][ T1181] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 296.896050][ T1181] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 296.902248][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 296.912247][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 296.912615][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 296.927743][ T3800] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 296.952318][ T8653] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 298.175888][ T3212] Bluetooth: hci0: command 0x0409 tx timeout [ 300.255624][ T3212] Bluetooth: hci0: command 0x041b tx timeout 2021/06/30 14:28:04 executed programs: 1 [ 302.335489][ T3212] Bluetooth: hci0: command 0x040f tx timeout [ 303.523251][ T8671] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 304.415316][ T3212] Bluetooth: hci0: command 0x0419 tx timeout [ 309.788571][ T8671] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888101ed8040 (size 32): comm "syz-executor.0", pid 8653, jiffies 4294966967 (age 12.880s) hex dump (first 32 bytes): 00 d0 39 01 00 c9 ff ff 20 ee 80 84 ff ff ff ff ..9..... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881018afe00 (size 32): comm "syz-executor.0", pid 8653, jiffies 4294966967 (age 12.880s) hex dump (first 32 bytes): 00 d0 39 01 00 c9 ff ff 60 ee 80 84 ff ff ff ff ..9.....`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881018afc40 (size 32): comm "syz-executor.0", pid 8653, jiffies 4294966967 (age 12.880s) hex dump (first 32 bytes): 00 d0 39 01 00 c9 ff ff a0 ee 80 84 ff ff ff ff ..9............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881018afb80 (size 32): comm "syz-executor.0", pid 8653, jiffies 4294966967 (age 12.880s) hex dump (first 32 bytes): 00 d0 39 01 00 c9 ff ff e0 ee 80 84 ff ff ff ff ..9............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881018afac0 (size 32): comm "syz-executor.0", pid 8653, jiffies 4294966967 (age 12.880s) hex dump (first 32 bytes): 00 d0 39 01 00 c9 ff ff 20 ef 80 84 ff ff ff ff ..9..... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881018af9c0 (size 32): comm "syz-executor.0", pid 8653, jiffies 4294966967 (age 12.880s) hex dump (first 32 bytes): 00 d0 39 01 00 c9 ff ff 60 ef 80 84 ff ff ff ff ..9.....`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101f37300 (size 32): comm "syz-executor.0", pid 8653, jiffies 4294966967 (age 12.880s) hex dump (first 32 bytes): 00 d0 39 01 00 c9 ff ff a0 ef 80 84 ff ff ff ff ..9............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae