[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.51' (ECDSA) to the list of known hosts. 2020/04/24 11:59:22 parsed 1 programs syzkaller login: [ 83.090417][ T3830] kmemleak: Automatic memory scanning thread ended 2020/04/24 11:59:31 executed programs: 0 [ 90.622059][ T25] audit: type=1400 audit(1587729571.939:8): avc: denied { execmem } for pid=6686 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 90.634649][ T6687] IPVS: ftp: loaded support on port[0] = 21 [ 90.669893][ T6687] chnl_net:caif_netlink_parms(): no params data found [ 90.751055][ T6687] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.758331][ T6687] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.765625][ T6687] device bridge_slave_0 entered promiscuous mode [ 90.772907][ T6687] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.780194][ T6687] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.787656][ T6687] device bridge_slave_1 entered promiscuous mode [ 90.798126][ T6687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.808100][ T6687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.820716][ T6687] team0: Port device team_slave_0 added [ 90.826957][ T6687] team0: Port device team_slave_1 added [ 90.835903][ T6687] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 90.843349][ T6687] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 90.870639][ T6687] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 90.881975][ T6687] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 90.889411][ T6687] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 90.919606][ T6687] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 90.978217][ T6687] device hsr_slave_0 entered promiscuous mode [ 91.027485][ T6687] device hsr_slave_1 entered promiscuous mode [ 91.097276][ T6687] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 91.148255][ T6687] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 91.198301][ T6687] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 91.258107][ T6687] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 91.322140][ T6687] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.329497][ T6687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.336739][ T6687] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.343915][ T6687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.361241][ T6687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.370004][ T2963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.378433][ T2963] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.385624][ T2963] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.393740][ T2963] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 91.402466][ T6687] 8021q: adding VLAN 0 to HW filter on device team0 [ 91.410687][ T3585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.419178][ T3585] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.426456][ T3585] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.435522][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.444038][ T16] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.451389][ T16] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.465129][ T6687] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 91.475972][ T6687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 91.487261][ T3585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.495668][ T3585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.504810][ T3585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.513243][ T3585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.521281][ T3585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.529655][ T3585] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.541080][ T6687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.548427][ T3585] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.555885][ T3585] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 91.567715][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.580845][ T6687] device veth0_vlan entered promiscuous mode [ 91.587944][ T6890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.595826][ T6890] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.603673][ T6890] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.612752][ T6687] device veth1_vlan entered promiscuous mode [ 91.623169][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 91.631212][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 91.639224][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.648567][ T6687] device veth0_macvtap entered promiscuous mode [ 91.656104][ T6687] device veth1_macvtap entered promiscuous mode [ 91.665665][ T6687] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 91.673168][ T6890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.681784][ T6890] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 91.690976][ T6687] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 91.698397][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 91.706998][ T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/04/24 11:59:38 executed programs: 1 2020/04/24 11:59:44 executed programs: 3 2020/04/24 11:59:50 executed programs: 5 2020/04/24 11:59:56 executed programs: 7 [ 116.329165][ T6936] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 121.644551][ T0] NOHZ: local_softirq_pending 08 BUG: memory leak unreferenced object 0xffff888110aac980 (size 2200): comm "syz-executor.0", pid 6929, jiffies 4294948199 (age 13.930s) hex dump (first 32 bytes): ac 14 14 bb ac 14 14 0a 80 a5 7b 98 40 01 00 00 ..........{.@... 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<000000008400c943>] sk_prot_alloc+0x3c/0x170 [<00000000d6203ac8>] sk_alloc+0x30/0x330 [<00000000d59b5474>] inet_create+0x119/0x450 [<00000000d491086e>] __sock_create+0x14a/0x220 [<000000008464772c>] __sys_socket+0x60/0x110 [<0000000024afa740>] __x64_sys_socket+0x1a/0x20 [<000000001cfbd91b>] do_syscall_64+0x6e/0x220 [<000000000796e7af>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888129234ec0 (size 32): comm "syz-executor.0", pid 6929, jiffies 4294948199 (age 13.930s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 40 d8 5d 1a 81 88 ff ff ........@.]..... 01 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ backtrace: [<00000000c7618f6d>] selinux_sk_alloc_security+0x43/0xa0 [<0000000023bb586e>] security_sk_alloc+0x42/0x70 [<0000000018bf3a55>] sk_prot_alloc+0x9c/0x170 [<00000000d6203ac8>] sk_alloc+0x30/0x330 [<00000000d59b5474>] inet_create+0x119/0x450 [<00000000d491086e>] __sock_create+0x14a/0x220 [<000000008464772c>] __sys_socket+0x60/0x110 [<0000000024afa740>] __x64_sys_socket+0x1a/0x20 [<000000001cfbd91b>] do_syscall_64+0x6e/0x220 [<000000000796e7af>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811a5dd840 (size 64): comm "syz-executor.0", pid 6929, jiffies 4294948199 (age 13.930s) hex dump (first 32 bytes): 15 00 00 01 00 00 00 00 a0 4a 57 1a 81 88 ff ff .........JW..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bc41144f>] selinux_netlbl_sock_genattr+0x48/0x180 [<0000000039d52601>] selinux_netlbl_socket_post_create+0x41/0xb0 [<000000004d7e724a>] selinux_socket_post_create+0x182/0x390 [<000000009ebc86f9>] security_socket_post_create+0x54/0x80 [<00000000340c34be>] __sock_create+0x1cc/0x220 [<000000008464772c>] __sys_socket+0x60/0x110 [<0000000024afa740>] __x64_sys_socket+0x1a/0x20 [<000000001cfbd91b>] do_syscall_64+0x6e/0x220 [<000000000796e7af>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811a574aa0 (size 32): comm "syz-executor.0", pid 6929, jiffies 4294948199 (age 13.930s) hex dump (first 32 bytes): 6b 65 72 6e 65 6c 5f 74 00 73 79 73 74 65 6d 5f kernel_t.system_ 72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00 r:kernel_t:s0... backtrace: [<000000005dfff70c>] kstrdup+0x36/0x70 [<0000000046ad258d>] security_netlbl_sid_to_secattr+0x97/0x100 [<000000007a82b1d8>] selinux_netlbl_sock_genattr+0x67/0x180 [<0000000039d52601>] selinux_netlbl_socket_post_create+0x41/0xb0 [<000000004d7e724a>] selinux_socket_post_create+0x182/0x390 [<000000009ebc86f9>] security_socket_post_create+0x54/0x80 [<00000000340c34be>] __sock_create+0x1cc/0x220 [<000000008464772c>] __sys_socket+0x60/0x110 [<0000000024afa740>] __x64_sys_socket+0x1a/0x20 [<000000001cfbd91b>] do_syscall_64+0x6e/0x220 [<000000000796e7af>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811b333e00 (size 512): comm "syz-executor.0", pid 6929, jiffies 4294948199 (age 13.930s) hex dump (first 32 bytes): 80 c9 aa 10 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 ................ backtrace: [<000000002265333e>] sk_psock_init+0x2a/0x180 [<000000005ab51168>] sock_map_link.isra.0+0x469/0x4f0 [<000000007a357e4d>] sock_map_update_common+0xa1/0x3c0 [<00000000b7445064>] sock_map_update_elem+0x1e9/0x220 [<00000000538fb251>] bpf_map_update_value.isra.0+0x141/0x2f0 [<00000000b3d3b9c3>] __do_sys_bpf+0x16bf/0x1f00 [<000000001cfbd91b>] do_syscall_64+0x6e/0x220 [<000000000796e7af>] entry_SYSCALL_64_after_hwframe+0x44/0xa9