Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts. 2021/06/30 13:13:27 parsed 1 programs 2021/06/30 13:13:34 executed programs: 0 syzkaller login: [ 298.707326][ T8437] chnl_net:caif_netlink_parms(): no params data found [ 298.726080][ T8437] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.738149][ T8437] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.745680][ T8437] device bridge_slave_0 entered promiscuous mode [ 298.754078][ T8437] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.761577][ T8437] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.769444][ T8437] device bridge_slave_1 entered promiscuous mode [ 298.780554][ T8437] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 298.790532][ T8437] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 298.804506][ T8437] team0: Port device team_slave_0 added [ 298.810905][ T8437] team0: Port device team_slave_1 added [ 298.820199][ T8437] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 298.827333][ T8437] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 298.853711][ T8437] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 298.864907][ T8437] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 298.872185][ T8437] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 298.899502][ T8437] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 298.915182][ T8437] device hsr_slave_0 entered promiscuous mode [ 298.921844][ T8437] device hsr_slave_1 entered promiscuous mode [ 298.951876][ T8437] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 298.961846][ T8437] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 298.969848][ T8437] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 298.977823][ T8437] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 298.989625][ T8437] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.996689][ T8437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.004038][ T8437] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.011145][ T8437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.031089][ T8437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.040482][ T1936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.048704][ T1936] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.056343][ T1936] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.064682][ T1936] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 299.074068][ T8437] 8021q: adding VLAN 0 to HW filter on device team0 [ 299.082622][ T1936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.091959][ T1936] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.099738][ T1936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.110236][ T1936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.118799][ T1936] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.126016][ T1936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.140896][ T8437] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 299.152067][ T8437] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 299.164198][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 299.172852][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 299.181972][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.190591][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.199279][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 299.207318][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 299.221023][ T8437] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 299.228980][ T1936] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 299.237006][ T1936] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 299.254140][ T8437] device veth0_vlan entered promiscuous mode [ 299.260790][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 299.269385][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.277626][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 299.285412][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.295739][ T8437] device veth1_vlan entered promiscuous mode [ 299.307730][ T3800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 299.315958][ T3800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 299.324436][ T3800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 299.334659][ T8437] device veth0_macvtap entered promiscuous mode [ 299.343652][ T8437] device veth1_macvtap entered promiscuous mode [ 299.354460][ T8437] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 299.362161][ T3800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.371474][ T3800] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 299.381448][ T8437] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 299.389357][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.400864][ T8437] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.411352][ T8437] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.420457][ T8437] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.430802][ T8437] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.466201][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 299.477820][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 299.489556][ T3800] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 299.500973][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 299.509603][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 299.517942][ T4835] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 299.543604][ T8677] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 300.707789][ T1936] Bluetooth: hci0: command 0x0409 tx timeout [ 302.787478][ T1936] Bluetooth: hci0: command 0x041b tx timeout [ 304.867304][ T4835] Bluetooth: hci0: command 0x040f tx timeout 2021/06/30 13:13:41 executed programs: 1 [ 306.247288][ T8696] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 306.947142][ T4835] Bluetooth: hci0: command 0x0419 tx timeout [ 312.579743][ T8696] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888101d07300 (size 32): comm "syz-executor.0", pid 8677, jiffies 4294967229 (age 13.080s) hex dump (first 32 bytes): 00 90 3d 01 00 c9 ff ff 20 ee 80 84 ff ff ff ff ..=..... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101d07ba0 (size 32): comm "syz-executor.0", pid 8677, jiffies 4294967229 (age 13.080s) hex dump (first 32 bytes): 00 90 3d 01 00 c9 ff ff a0 ee 80 84 ff ff ff ff ..=............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101d07dc0 (size 32): comm "syz-executor.0", pid 8677, jiffies 4294967229 (age 13.080s) hex dump (first 32 bytes): 00 90 3d 01 00 c9 ff ff 20 ef 80 84 ff ff ff ff ..=..... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881017412c0 (size 32): comm "syz-executor.0", pid 8677, jiffies 4294967229 (age 13.080s) hex dump (first 32 bytes): 00 90 3d 01 00 c9 ff ff 60 ef 80 84 ff ff ff ff ..=.....`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101741a20 (size 32): comm "syz-executor.0", pid 8677, jiffies 4294967229 (age 13.080s) hex dump (first 32 bytes): 00 90 3d 01 00 c9 ff ff a0 ef 80 84 ff ff ff ff ..=............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101d077e0 (size 32): comm "syz-executor.0", pid 8677, jiffies 4294967229 (age 13.080s) hex dump (first 32 bytes): 00 90 3d 01 00 c9 ff ff e0 ef 80 84 ff ff ff ff ..=............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881017417a0 (size 32): comm "syz-executor.0", pid 8677, jiffies 4294967229 (age 13.080s) hex dump (first 32 bytes): 00 90 3d 01 00 c9 ff ff 20 f0 80 84 ff ff ff ff ..=..... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae