[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.142' (ECDSA) to the list of known hosts. 2020/05/21 04:51:08 parsed 1 programs syzkaller login: [ 75.410020][ T3834] kmemleak: Automatic memory scanning thread ended 2020/05/21 04:51:15 executed programs: 0 [ 82.838232][ T25] audit: type=1400 audit(1590036675.920:8): avc: denied { execmem } for pid=6620 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 82.866147][ T6621] IPVS: ftp: loaded support on port[0] = 21 [ 82.893326][ T6621] chnl_net:caif_netlink_parms(): no params data found [ 82.940120][ T6621] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.947380][ T6621] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.954908][ T6621] device bridge_slave_0 entered promiscuous mode [ 82.961745][ T6621] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.969610][ T6621] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.977084][ T6621] device bridge_slave_1 entered promiscuous mode [ 82.986890][ T6621] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.996759][ T6621] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.008958][ T6621] team0: Port device team_slave_0 added [ 83.015470][ T6621] team0: Port device team_slave_1 added [ 83.024843][ T6621] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 83.031792][ T6621] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 83.058107][ T6621] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 83.069371][ T6621] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 83.076551][ T6621] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 83.102774][ T6621] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 83.183499][ T6621] device hsr_slave_0 entered promiscuous mode [ 83.252772][ T6621] device hsr_slave_1 entered promiscuous mode [ 83.331418][ T6621] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.383589][ T6621] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.443538][ T6621] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.503473][ T6621] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.547526][ T6621] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.554767][ T6621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.562010][ T6621] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.569039][ T6621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.584728][ T6621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.593773][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.601375][ T6824] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.609645][ T6824] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.617119][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 83.625940][ T6621] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.634096][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.642330][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.649357][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.657701][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.666315][ T6824] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.673365][ T6824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.686698][ T6621] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 83.697202][ T6621] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.708457][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.716628][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.724722][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.732757][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.740964][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.748339][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.758453][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 83.766477][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 83.775661][ T6621] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.786317][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 83.797876][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.806283][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.814153][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.822244][ T6621] device veth0_vlan entered promiscuous mode [ 83.830042][ T6621] device veth1_vlan entered promiscuous mode [ 83.840354][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 83.848374][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 83.856209][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 83.865494][ T6621] device veth0_macvtap entered promiscuous mode [ 83.873191][ T6621] device veth1_macvtap entered promiscuous mode [ 83.883597][ T6621] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 83.890950][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 83.899956][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 83.908901][ T6621] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 83.916382][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 83.924780][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 83.968020][ T6846] ubi0: attaching mtd0 [ 83.972301][ T6846] ubi0: scanning is finished [ 83.977424][ T6846] ubi0: empty MTD device detected [ 84.013463][ T6846] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 84.020935][ T6846] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 84.028487][ T6846] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 84.035520][ T6846] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 84.043375][ T6846] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 84.050367][ T6846] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 84.058449][ T6846] ubi0: max/mean erase counter: 0/0, WL threshold: 4096, image sequence number: 470471335 [ 84.068473][ T6846] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 84.078495][ T6850] ubi0: background thread "ubi_bgt0d" started, PID 6850 2020/05/21 04:51:22 executed programs: 1 [ 89.811916][ T6856] ubi0: detaching mtd0 [ 89.816773][ T6856] ubi0: mtd0 is detached [ 89.821137][ T6856] ubi0: attaching mtd0 [ 89.825446][ T6856] ubi0: scanning is finished [ 89.872225][ T6856] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 89.879694][ T6856] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 89.887238][ T6856] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 89.894661][ T6856] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 89.902208][ T6856] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 89.908941][ T6856] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 89.917218][ T6856] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 470471335 [ 89.927321][ T6856] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 89.937501][ T6860] ubi0: background thread "ubi_bgt0d" started, PID 6860 [ 89.949567][ T6862] ubi0: detaching mtd0 [ 89.954105][ T6862] ubi0: mtd0 is detached [ 89.958452][ T6862] ubi0: attaching mtd0 [ 89.962963][ T6862] ubi0: scanning is finished [ 89.995334][ T6862] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 90.002969][ T6862] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 90.010359][ T6862] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 90.017426][ T6862] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 90.024806][ T6862] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 90.031573][ T6862] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 90.039518][ T6862] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 470471335 [ 90.049939][ T6862] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 90.059884][ T6868] ubi0: background thread "ubi_bgt0d" started, PID 6868 [ 95.643910][ T6869] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888127f3d220 (size 32): comm "syz-executor.0", pid 6846, jiffies 4294945671 (age 14.130s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 ................ backtrace: [<0000000011b50e96>] erase_aeb+0x25/0x110 [<000000001d513a41>] ubi_wl_init+0x193/0x5c0 [<00000000d0cdf686>] ubi_attach+0x611/0x18ba [<00000000a383d2a0>] ubi_attach_mtd_dev+0x665/0xcc0 [<00000000a0febe73>] ctrl_cdev_ioctl+0x144/0x1b0 [<00000000a2b2993d>] ksys_ioctl+0xa6/0xd0 [<000000006a99cb56>] __x64_sys_ioctl+0x1a/0x20 [<0000000096066432>] do_syscall_64+0x6e/0x220 [<00000000e9723ba2>] entry_SYSCALL_64_after_hwframe+0x44/0xa9