[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. 2020/04/03 00:52:26 parsed 1 programs syzkaller login: [ 557.988810][ T3822] kmemleak: Automatic memory scanning thread ended [ 559.179533][ T6617] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 2020/04/03 00:52:35 executed programs: 0 [ 565.511621][ T25] audit: type=1400 audit(1585875155.636:8): avc: denied { execmem } for pid=6619 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 565.524408][ T6620] IPVS: ftp: loaded support on port[0] = 21 [ 565.557250][ T6620] chnl_net:caif_netlink_parms(): no params data found [ 565.616971][ T6620] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.624052][ T6620] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.631574][ T6620] device bridge_slave_0 entered promiscuous mode [ 565.638732][ T6620] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.645759][ T6620] bridge0: port 2(bridge_slave_1) entered disabled state [ 565.653128][ T6620] device bridge_slave_1 entered promiscuous mode [ 565.662767][ T6620] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 565.672431][ T6620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 565.684731][ T6620] team0: Port device team_slave_0 added [ 565.690977][ T6620] team0: Port device team_slave_1 added [ 565.699630][ T6620] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 565.706644][ T6620] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 565.732564][ T6620] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 565.743547][ T6620] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 565.750541][ T6620] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 565.776415][ T6620] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 565.827655][ T6620] device hsr_slave_0 entered promiscuous mode [ 565.866938][ T6620] device hsr_slave_1 entered promiscuous mode [ 565.936140][ T6620] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 565.967765][ T6620] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 565.997727][ T6620] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 566.047600][ T6620] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 566.121613][ T6620] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.128658][ T6620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 566.135861][ T6620] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.142917][ T6620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 566.159411][ T6620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 566.168226][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 566.175748][ T3051] bridge0: port 1(bridge_slave_0) entered disabled state [ 566.183285][ T3051] bridge0: port 2(bridge_slave_1) entered disabled state [ 566.190760][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 566.199848][ T6620] 8021q: adding VLAN 0 to HW filter on device team0 [ 566.207806][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 566.215916][ T3576] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.222949][ T3576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 566.236958][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 566.245144][ T3576] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.252185][ T3576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 566.259962][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 566.268137][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 566.276107][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 566.284002][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 566.292058][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 566.300221][ T6620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 566.310275][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 566.317694][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 566.326391][ T6620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 566.337047][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 566.348835][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 566.357008][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 566.364400][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 566.372889][ T6620] device veth0_vlan entered promiscuous mode [ 566.381683][ T6620] device veth1_vlan entered promiscuous mode [ 566.392648][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 566.401490][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 566.409271][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 566.418311][ T6620] device veth0_macvtap entered promiscuous mode [ 566.425449][ T6620] device veth1_macvtap entered promiscuous mode [ 566.434914][ T6620] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 566.442437][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 566.451054][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 566.459833][ T6620] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 566.467214][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/04/03 00:52:42 executed programs: 1 [ 573.475436][ T6857] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 580.098733][ T6857] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888124c04380 (size 32): comm "syz-executor.0", pid 6848, jiffies 4294993931 (age 13.670s) hex dump (first 32 bytes): c0 76 64 84 ff ff ff ff 90 3a b4 83 ff ff ff ff .vd......:...... 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<000000005276699f>] genl_rcv_msg+0x360/0x520 [<000000006390c5bc>] netlink_rcv_skb+0x5a/0x180 [<000000004449e256>] genl_rcv+0x24/0x40 [<000000008739884e>] netlink_unicast+0x20a/0x2f0 [<000000004d5b112e>] netlink_sendmsg+0x2b5/0x560 [<00000000ccd4c063>] sock_sendmsg+0x4c/0x60 [<00000000b475ab4d>] ____sys_sendmsg+0x2c0/0x2f0 [<00000000b12940c0>] ___sys_sendmsg+0x8a/0xd0 [<0000000022ad9f39>] __sys_sendmsg+0x77/0xe0 [<00000000b978f80f>] do_syscall_64+0x6e/0x220 [<0000000028e0b4a3>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811a652600 (size 32): comm "syz-executor.0", pid 6854, jiffies 4294994500 (age 7.980s) hex dump (first 32 bytes): c0 76 64 84 ff ff ff ff 90 3a b4 83 ff ff ff ff .vd......:...... 00 00 00 00 00 00 00 00 5f 74 3a 73 30 00 00 00 ........_t:s0... backtrace: [<000000005276699f>] genl_rcv_msg+0x360/0x520 [<000000006390c5bc>] netlink_rcv_skb+0x5a/0x180 [<000000004449e256>] genl_rcv+0x24/0x40 [<000000008739884e>] netlink_unicast+0x20a/0x2f0 [<000000004d5b112e>] netlink_sendmsg+0x2b5/0x560 [<00000000ccd4c063>] sock_sendmsg+0x4c/0x60 [<00000000b475ab4d>] ____sys_sendmsg+0x2c0/0x2f0 [<00000000b12940c0>] ___sys_sendmsg+0x8a/0xd0 [<0000000022ad9f39>] __sys_sendmsg+0x77/0xe0 [<00000000b978f80f>] do_syscall_64+0x6e/0x220 [<0000000028e0b4a3>] entry_SYSCALL_64_after_hwframe+0x44/0xa9