[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.79' (ECDSA) to the list of known hosts. 2020/08/23 22:18:02 parsed 1 programs syzkaller login: [ 157.425550][ T3672] kmemleak: Automatic memory scanning thread ended 2020/08/23 22:18:09 executed programs: 0 [ 164.803424][ T24] audit: type=1400 audit(1598221089.950:8): avc: denied { execmem } for pid=6553 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 165.897685][ T6554] IPVS: ftp: loaded support on port[0] = 21 [ 165.968440][ T6554] chnl_net:caif_netlink_parms(): no params data found [ 165.994844][ T6554] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.001990][ T6554] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.009185][ T6554] device bridge_slave_0 entered promiscuous mode [ 166.016607][ T6554] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.023886][ T6554] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.031280][ T6554] device bridge_slave_1 entered promiscuous mode [ 166.041613][ T6554] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.051348][ T6554] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.064046][ T6554] team0: Port device team_slave_0 added [ 166.070034][ T6554] team0: Port device team_slave_1 added [ 166.079091][ T6554] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 166.086282][ T6554] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.112898][ T6554] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 166.124003][ T6554] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 166.130927][ T6554] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.157107][ T6554] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.172287][ T6554] device hsr_slave_0 entered promiscuous mode [ 166.178579][ T6554] device hsr_slave_1 entered promiscuous mode [ 166.207725][ T6554] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 166.215583][ T6554] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 166.225481][ T6554] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 166.233916][ T6554] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 166.246183][ T6554] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.253204][ T6554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.260403][ T6554] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.267469][ T6554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.285282][ T6554] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.293987][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.302534][ T3713] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.309676][ T3713] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.317415][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 166.326272][ T6554] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.334254][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.342751][ T2932] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.349755][ T2932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.361594][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.369713][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.376738][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.384612][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.396177][ T6554] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 166.406542][ T6554] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.417741][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.425322][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.433420][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.441829][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.450030][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.460275][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 166.467948][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.477464][ T6554] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.488032][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.499734][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.507840][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.515285][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.523516][ T6554] device veth0_vlan entered promiscuous mode [ 166.530910][ T6554] device veth1_vlan entered promiscuous mode [ 166.541634][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 166.549288][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 166.557401][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 166.566844][ T6554] device veth0_macvtap entered promiscuous mode [ 166.574169][ T6554] device veth1_macvtap entered promiscuous mode [ 166.584048][ T6554] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 166.591311][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.599717][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 166.609033][ T6554] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 166.616424][ T3713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.625679][ T6554] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.634557][ T6554] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.643231][ T6554] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.651944][ T6554] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.961126][ T3713] Bluetooth: hci0: command 0x0409 tx timeout [ 170.041102][ T3713] Bluetooth: hci0: command 0x041b tx timeout 2020/08/23 22:18:17 executed programs: 1 [ 172.121212][ T3713] Bluetooth: hci0: command 0x040f tx timeout [ 173.336179][ T6802] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 174.201113][ T3713] Bluetooth: hci0: command 0x0419 tx timeout [ 179.743101][ T6802] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88812a413f00 (size 168): comm "syz-executor.0", pid 6554, jiffies 4294953946 (age 13.120s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008b882031>] prepare_creds+0x25/0x2f0 [<000000001d1756e8>] copy_creds+0x2e/0x1d1 [<00000000a3a640ca>] copy_process+0x50c/0x1f20 [<00000000a1ad8dee>] _do_fork+0xad/0x530 [<0000000070af4cd7>] __do_sys_clone+0x76/0xa0 [<000000001470b5cf>] do_syscall_64+0x2d/0x70 [<00000000b4c4b313>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811b54e440 (size 32): comm "syz-executor.0", pid 6554, jiffies 4294953946 (age 13.120s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000138403e6>] security_prepare_creds+0x97/0xc0 [<0000000051662e48>] prepare_creds+0x1e1/0x2f0 [<000000001d1756e8>] copy_creds+0x2e/0x1d1 [<00000000a3a640ca>] copy_process+0x50c/0x1f20 [<00000000a1ad8dee>] _do_fork+0xad/0x530 [<0000000070af4cd7>] __do_sys_clone+0x76/0xa0 [<000000001470b5cf>] do_syscall_64+0x2d/0x70 [<00000000b4c4b313>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88812a657a00 (size 256): comm "syz-executor.0", pid 6790, jiffies 4294953946 (age 13.120s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a0 e1 14 2b 81 88 ff ff 80 74 8f 16 81 88 ff ff ...+.....t...... backtrace: [<0000000053e1d866>] __alloc_file+0x23/0x120 [<000000000d5d3703>] alloc_empty_file+0x4f/0xe0 [<0000000091abea17>] alloc_file+0x31/0x160 [<000000004bfab74c>] alloc_file_pseudo+0xae/0x120 [<00000000fc9b3b90>] anon_inode_getfile+0x8e/0x100 [<00000000cbd9d057>] anon_inode_getfd+0x42/0x90 [<00000000589d6af2>] __do_sys_bpf+0x67c/0x2450 [<000000001470b5cf>] do_syscall_64+0x2d/0x70 [<00000000b4c4b313>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88812a73db50 (size 16): comm "syz-executor.0", pid 6790, jiffies 4294953946 (age 13.120s) hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008ddd472b>] security_file_alloc+0x2e/0xc0 [<0000000079d891d7>] __alloc_file+0x61/0x120 [<000000000d5d3703>] alloc_empty_file+0x4f/0xe0 [<0000000091abea17>] alloc_file+0x31/0x160 [<000000004bfab74c>] alloc_file_pseudo+0xae/0x120 [<00000000fc9b3b90>] anon_inode_getfile+0x8e/0x100 [<00000000cbd9d057>] anon_inode_getfd+0x42/0x90 [<00000000589d6af2>] __do_sys_bpf+0x67c/0x2450 [<000000001470b5cf>] do_syscall_64+0x2d/0x70 [<00000000b4c4b313>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88812a419240 (size 168): comm "syz-executor.0", pid 6554, jiffies 4294954493 (age 7.650s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008b882031>] prepare_creds+0x25/0x2f0 [<000000001d1756e8>] copy_creds+0x2e/0x1d1 [<00000000a3a640ca>] copy_process+0x50c/0x1f20 [<00000000a1ad8dee>] _do_fork+0xad/0x530 [<0000000070af4cd7>] __do_sys_clone+0x76/0xa0 [<000000001470b5cf>] do_syscall_64+0x2d/0x70 [<00000000b4c4b313>] entry_SYSCALL_64_after_hwframe+0x44/0xa9