[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.151' (ECDSA) to the list of known hosts. executing program executing program executing program syzkaller login: [ 315.651749][ T3266] ieee802154 phy0 wpan0: encryption failed: -22 [ 315.658066][ T3266] ieee802154 phy1 wpan1: encryption failed: -22 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 377.091646][ T3266] ieee802154 phy0 wpan0: encryption failed: -22 [ 377.097966][ T3266] ieee802154 phy1 wpan1: encryption failed: -22 [ 380.121310][ T8390] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810dc60c00 (size 512): comm "syz-executor612", pid 8404, jiffies 4294969473 (age 60.270s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000003f1767d6>] __alloc_skb+0xdf/0x280 [<000000004784ec77>] __pskb_copy_fclone+0x73/0x330 [<00000000ec4f758f>] hwsim_hw_xmit+0xd3/0x140 [<000000005cf5279d>] ieee802154_tx+0xc7/0x190 [<000000006b771237>] ieee802154_subif_start_xmit+0x58/0x70 [<000000002cb0db6e>] dev_hard_start_xmit+0xe1/0x330 [<0000000016f651e8>] sch_direct_xmit+0x1c5/0x500 [<00000000d18bc749>] __qdisc_run+0x201/0x810 [<00000000d51d6a99>] __dev_queue_xmit+0xb9f/0xf60 [<000000006cabff57>] raw_sendmsg+0x1f4/0x2b0 [<00000000a8911f10>] sock_sendmsg+0x56/0x80 [<00000000b6ef50e0>] ____sys_sendmsg+0x36c/0x390 [<00000000896fa44c>] ___sys_sendmsg+0x8b/0xd0 [<00000000ae469fc2>] __sys_sendmsg+0x88/0x100 [<0000000023ee7f54>] do_syscall_64+0x2d/0x70 [<00000000992614ff>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88811023f800 (size 232): comm "softirq", pid 0, jiffies 4294969473 (age 60.270s) hex dump (first 32 bytes): 10 11 f7 0d 81 88 ff ff 10 11 f7 0d 81 88 ff ff ................ 00 00 00 00 00 00 00 00 40 10 f7 0d 81 88 ff ff ........@....... backtrace: [<00000000364d8d91>] skb_clone+0xaa/0x2b0 [<000000001f622a43>] ieee802154_rcv+0x100/0x340 [<0000000075e56cbb>] __netif_receive_skb_one_core+0x6a/0xa0 [<00000000a6af4baa>] __netif_receive_skb+0x27/0xa0 [<00000000a0595709>] netif_receive_skb+0x59/0x260 [<00000000478cd035>] ieee802154_rx+0x612/0x620 [<00000000208882bb>] ieee802154_tasklet_handler+0x86/0xa0 [<000000006fa6d894>] tasklet_action_common.constprop.0+0x5b/0x100 [<00000000fa1025b9>] __do_softirq+0xbf/0x2ab [<0000000074127c07>] do_softirq+0x5c/0x80 [<000000005be583fa>] __local_bh_enable_ip+0x51/0x60 [<00000000962346db>] __dev_queue_xmit+0x7f4/0xf60 [<000000006cabff57>] raw_sendmsg+0x1f4/0x2b0 [<00000000a8911f10>] sock_sendmsg+0x56/0x80 [<00000000b6ef50e0>] ____sys_sendmsg+0x36c/0x390 [<00000000896fa44c>] ___sys_sendmsg+0x8b/0xd0 BUG: memory leak unreferenced object 0xffff88810df3fa00 (size 512): comm "syz-executor612", pid 8405, jiffies 4294970004 (age 54.960s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000003f1767d6>] __alloc_skb+0xdf/0x280 [<000000004784ec77>] __pskb_copy_fclone+0x73/0x330 [<00000000ec4f758f>] hwsim_hw_xmit+0xd3/0x140 [<000000005cf5279d>] ieee802154_tx+0xc7/0x190 [<000000006b771237>] ieee802154_subif_start_xmit+0x58/0x70 [<000000002cb0db6e>] dev_hard_start_xmit+0xe1/0x330 [<0000000016f651e8>] sch_direct_xmit+0x1c5/0x500 [<00000000d18bc749>] __qdisc_run+0x201/0x810 [<00000000d51d6a99>] __dev_queue_xmit+0xb9f/0xf60 [<000000006cabff57>] raw_sendmsg+0x1f4/0x2b0 [<00000000a8911f10>] sock_sendmsg+0x56/0x80 [<00000000b6ef50e0>] ____sys_sendmsg+0x36c/0x390 [<00000000896fa44c>] ___sys_sendmsg+0x8b/0xd0 [<00000000ae469fc2>] __sys_sendmsg+0x88/0x100 [<0000000023ee7f54>] do_syscall_64+0x2d/0x70 [<00000000992614ff>] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 382.276437][ T8390] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak)