[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.43' (ECDSA) to the list of known hosts. 2020/12/24 15:23:23 parsed 1 programs 2020/12/24 15:23:31 executed programs: 0 syzkaller login: [ 182.965896][ T8507] IPVS: ftp: loaded support on port[0] = 21 [ 183.017236][ T8507] chnl_net:caif_netlink_parms(): no params data found [ 183.036032][ T8507] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.043137][ T8507] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.051727][ T8507] device bridge_slave_0 entered promiscuous mode [ 183.058696][ T8507] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.065716][ T8507] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.073069][ T8507] device bridge_slave_1 entered promiscuous mode [ 183.083532][ T8507] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.093325][ T8507] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.105939][ T8507] team0: Port device team_slave_0 added [ 183.112122][ T8507] team0: Port device team_slave_1 added [ 183.121044][ T8507] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 183.127988][ T8507] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.153860][ T8507] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.164901][ T8507] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.171842][ T8507] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.197723][ T8507] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 183.208978][ T8507] device hsr_slave_0 entered promiscuous mode [ 183.215175][ T8507] device hsr_slave_1 entered promiscuous mode [ 183.243712][ T8507] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 183.251197][ T8507] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 183.258965][ T8507] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 183.266515][ T8507] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 183.277494][ T8507] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.284697][ T8507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.291927][ T8507] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.299055][ T8507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.317481][ T8507] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.326291][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.334348][ T3903] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.342119][ T3903] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.349625][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 183.358102][ T8507] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.368301][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.376397][ T3659] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.383415][ T3659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.390959][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.399223][ T3659] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.406224][ T3659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.416288][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.424473][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.433248][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.442756][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.451956][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.460726][ T8507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.473066][ T8507] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.480330][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.487613][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.503056][ T8507] device veth0_vlan entered promiscuous mode [ 183.509574][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.518107][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.525940][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.533791][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.543302][ T8507] device veth1_vlan entered promiscuous mode [ 183.554748][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 183.565482][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 183.573345][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.582513][ T8507] device veth0_macvtap entered promiscuous mode [ 183.590073][ T8507] device veth1_macvtap entered promiscuous mode [ 183.600713][ T8507] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 183.607950][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.616342][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 183.625764][ T8507] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 183.633289][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.642552][ T8507] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.651274][ T8507] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.660052][ T8507] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.669754][ T8507] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.700351][ T28] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 183.708464][ T28] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 183.714188][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 183.723617][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 183.724185][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 183.738779][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 185.017897][ T7] Bluetooth: hci0: command 0x0409 tx timeout [ 187.097722][ T7] Bluetooth: hci0: command 0x041b tx timeout 2020/12/24 15:23:38 executed programs: 1 [ 189.177732][ T3659] Bluetooth: hci0: command 0x040f tx timeout [ 190.212470][ T8754] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 191.257462][ T56] Bluetooth: hci0: command 0x0419 tx timeout [ 196.276285][ T8754] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888115f31f40 (size 64): comm "syz-executor.0", pid 8746, jiffies 4294955649 (age 12.590s) hex dump (first 32 bytes): 7f 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 ................ 00 e0 08 16 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008c650b39>] xskq_create+0x23/0xd0 [<00000000085439ef>] xsk_setsockopt+0x1c4/0x590 [<00000000bb67dec7>] __sys_setsockopt+0x1b0/0x360 [<00000000de35bac5>] __x64_sys_setsockopt+0x22/0x30 [<000000003b0be617>] do_syscall_64+0x2d/0x70 [<0000000086f9d68f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881160afe00 (size 64): comm "syz-executor.0", pid 8746, jiffies 4294955649 (age 12.590s) hex dump (first 32 bytes): ff 03 00 00 00 04 00 00 00 00 00 00 00 00 00 00 ................ 00 c0 12 16 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008c650b39>] xskq_create+0x23/0xd0 [<00000000085439ef>] xsk_setsockopt+0x1c4/0x590 [<00000000bb67dec7>] __sys_setsockopt+0x1b0/0x360 [<00000000de35bac5>] __x64_sys_setsockopt+0x22/0x30 [<000000003b0be617>] do_syscall_64+0x2d/0x70 [<0000000086f9d68f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810f9707c0 (size 64): comm "syz-executor.0", pid 8752, jiffies 4294956194 (age 7.140s) hex dump (first 32 bytes): 7f 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 ................ 00 b0 1c 01 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008c650b39>] xskq_create+0x23/0xd0 [<00000000085439ef>] xsk_setsockopt+0x1c4/0x590 [<00000000bb67dec7>] __sys_setsockopt+0x1b0/0x360 [<00000000de35bac5>] __x64_sys_setsockopt+0x22/0x30 [<000000003b0be617>] do_syscall_64+0x2d/0x70 [<0000000086f9d68f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810f970740 (size 64): comm "syz-executor.0", pid 8752, jiffies 4294956194 (age 7.140s) hex dump (first 32 bytes): ff 03 00 00 00 04 00 00 00 00 00 00 00 00 00 00 ................ 00 c0 0f 16 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008c650b39>] xskq_create+0x23/0xd0 [<00000000085439ef>] xsk_setsockopt+0x1c4/0x590 [<00000000bb67dec7>] __sys_setsockopt+0x1b0/0x360 [<00000000de35bac5>] __x64_sys_setsockopt+0x22/0x30 [<000000003b0be617>] do_syscall_64+0x2d/0x70 [<0000000086f9d68f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881160afa80 (size 64): comm "syz-executor.0", pid 8753, jiffies 4294956194 (age 7.140s) hex dump (first 32 bytes): 7f 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 ................ 00 b0 ec 15 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008c650b39>] xskq_create+0x23/0xd0 [<00000000085439ef>] xsk_setsockopt+0x1c4/0x590 [<00000000bb67dec7>] __sys_setsockopt+0x1b0/0x360 [<00000000de35bac5>] __x64_sys_setsockopt+0x22/0x30 [<000000003b0be617>] do_syscall_64+0x2d/0x70 [<0000000086f9d68f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881160afa00 (size 64): comm "syz-executor.0", pid 8753, jiffies 4294956194 (age 7.140s) hex dump (first 32 bytes): ff 03 00 00 00 04 00 00 00 00 00 00 00 00 00 00 ................ 00 00 12 16 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008c650b39>] xskq_create+0x23/0xd0 [<00000000085439ef>] xsk_setsockopt+0x1c4/0x590 [<00000000bb67dec7>] __sys_setsockopt+0x1b0/0x360 [<00000000de35bac5>] __x64_sys_setsockopt+0x22/0x30 [<000000003b0be617>] do_syscall_64+0x2d/0x70 [<0000000086f9d68f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9