[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.16' (ECDSA) to the list of known hosts. 2021/07/13 09:36:26 parsed 1 programs 2021/07/13 09:36:33 executed programs: 0 syzkaller login: [ 298.738832][ T8455] chnl_net:caif_netlink_parms(): no params data found [ 298.756303][ T8455] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.764003][ T8455] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.771581][ T8455] device bridge_slave_0 entered promiscuous mode [ 298.778492][ T8455] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.785562][ T8455] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.792915][ T8455] device bridge_slave_1 entered promiscuous mode [ 298.803446][ T8455] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 298.813108][ T8455] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 298.825626][ T8455] team0: Port device team_slave_0 added [ 298.831819][ T8455] team0: Port device team_slave_1 added [ 298.840695][ T8455] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 298.847612][ T8455] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 298.873471][ T8455] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 298.884574][ T8455] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 298.892077][ T8455] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 298.918336][ T8455] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 298.933850][ T8455] device hsr_slave_0 entered promiscuous mode [ 298.940229][ T8455] device hsr_slave_1 entered promiscuous mode [ 298.969506][ T8455] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 298.977301][ T8455] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 298.985136][ T8455] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 298.992658][ T8455] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 299.004061][ T8455] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.011200][ T8455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.018525][ T8455] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.025530][ T8455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.043418][ T8455] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.052244][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.060175][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.067474][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.075209][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 299.084077][ T8455] 8021q: adding VLAN 0 to HW filter on device team0 [ 299.092361][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.100758][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.107852][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.116725][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.124993][ T8674] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.132024][ T8674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.146346][ T8455] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 299.156960][ T8455] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 299.169294][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 299.177349][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 299.185646][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.193651][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.201676][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 299.209051][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 299.219702][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 299.227001][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 299.236533][ T8455] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 299.247279][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 299.260137][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.268102][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 299.275867][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.284280][ T8455] device veth0_vlan entered promiscuous mode [ 299.292220][ T8455] device veth1_vlan entered promiscuous mode [ 299.303212][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 299.310910][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 299.318970][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 299.328075][ T8455] device veth0_macvtap entered promiscuous mode [ 299.335573][ T8455] device veth1_macvtap entered promiscuous mode [ 299.345422][ T8455] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 299.352932][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.361458][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 299.370523][ T8455] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 299.377760][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.387349][ T8455] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.396146][ T8455] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.404931][ T8455] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.413689][ T8455] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.436296][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 299.446934][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 299.459572][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 299.467382][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 299.473573][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 299.482245][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 299.499235][ T8696] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 300.738776][ T8676] Bluetooth: hci0: command 0x0409 tx timeout [ 302.818515][ T7] Bluetooth: hci0: command 0x041b tx timeout [ 304.908514][ T7] Bluetooth: hci0: command 0x040f tx timeout 2021/07/13 09:36:40 executed programs: 1 [ 306.272473][ T8715] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 306.978484][ T5] Bluetooth: hci0: command 0x0419 tx timeout [ 312.643228][ T8715] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888101e2dbe0 (size 32): comm "syz-executor.0", pid 8696, jiffies 4294967221 (age 13.190s) hex dump (first 32 bytes): 00 d0 54 01 00 c9 ff ff 40 ee 80 84 ff ff ff ff ..T.....@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101f50d80 (size 32): comm "syz-executor.0", pid 8696, jiffies 4294967221 (age 13.190s) hex dump (first 32 bytes): 00 d0 54 01 00 c9 ff ff 80 ee 80 84 ff ff ff ff ..T............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101e2d420 (size 32): comm "syz-executor.0", pid 8696, jiffies 4294967221 (age 13.190s) hex dump (first 32 bytes): 00 d0 54 01 00 c9 ff ff c0 ee 80 84 ff ff ff ff ..T............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101f50b20 (size 32): comm "syz-executor.0", pid 8696, jiffies 4294967221 (age 13.190s) hex dump (first 32 bytes): 00 d0 54 01 00 c9 ff ff 00 ef 80 84 ff ff ff ff ..T............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881023b7260 (size 32): comm "syz-executor.0", pid 8696, jiffies 4294967221 (age 13.190s) hex dump (first 32 bytes): 00 d0 54 01 00 c9 ff ff 40 ef 80 84 ff ff ff ff ..T.....@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101a75780 (size 32): comm "syz-executor.0", pid 8696, jiffies 4294967221 (age 13.190s) hex dump (first 32 bytes): 00 d0 54 01 00 c9 ff ff 80 ef 80 84 ff ff ff ff ..T............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101f50500 (size 32): comm "syz-executor.0", pid 8696, jiffies 4294967221 (age 13.190s) hex dump (first 32 bytes): 00 d0 54 01 00 c9 ff ff c0 ef 80 84 ff ff ff ff ..T............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae