[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.9' (ECDSA) to the list of known hosts. 2020/08/27 20:13:07 parsed 1 programs syzkaller login: [ 1062.294436][ T3676] kmemleak: Automatic memory scanning thread ended 2020/08/27 20:13:14 executed programs: 0 [ 1069.481366][ T24] audit: type=1400 audit(1598559194.552:8): avc: denied { execmem } for pid=6479 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 1070.523667][ T6480] IPVS: ftp: loaded support on port[0] = 21 [ 1070.586478][ T6480] chnl_net:caif_netlink_parms(): no params data found [ 1070.650133][ T6480] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.658604][ T6480] bridge0: port 1(bridge_slave_0) entered disabled state [ 1070.665861][ T6480] device bridge_slave_0 entered promiscuous mode [ 1070.673061][ T6480] bridge0: port 2(bridge_slave_1) entered blocking state [ 1070.680337][ T6480] bridge0: port 2(bridge_slave_1) entered disabled state [ 1070.687874][ T6480] device bridge_slave_1 entered promiscuous mode [ 1070.698856][ T6480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1070.708655][ T6480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1070.721776][ T6480] team0: Port device team_slave_0 added [ 1070.727955][ T6480] team0: Port device team_slave_1 added [ 1070.736550][ T6480] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1070.743757][ T6480] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1070.770065][ T6480] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1070.781241][ T6480] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1070.788456][ T6480] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1070.814593][ T6480] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1070.829893][ T6480] device hsr_slave_0 entered promiscuous mode [ 1070.836126][ T6480] device hsr_slave_1 entered promiscuous mode [ 1070.864168][ T6480] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1070.871715][ T6480] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1070.881433][ T6480] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1070.889446][ T6480] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1070.901384][ T6480] bridge0: port 2(bridge_slave_1) entered blocking state [ 1070.908411][ T6480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1070.915606][ T6480] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.922989][ T6480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1070.940487][ T6480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1070.949227][ T6139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1070.958532][ T6139] bridge0: port 1(bridge_slave_0) entered disabled state [ 1070.965664][ T6139] bridge0: port 2(bridge_slave_1) entered disabled state [ 1070.973893][ T6139] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1070.982828][ T6480] 8021q: adding VLAN 0 to HW filter on device team0 [ 1070.991005][ T6451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1070.999307][ T6451] bridge0: port 1(bridge_slave_0) entered blocking state [ 1071.006427][ T6451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1071.021433][ T6480] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1071.031814][ T6480] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1071.043123][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1071.051456][ T6698] bridge0: port 2(bridge_slave_1) entered blocking state [ 1071.058479][ T6698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1071.066183][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1071.074747][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1071.082853][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1071.090932][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1071.099109][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1071.106412][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1071.116752][ T2911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1071.124289][ T2911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1071.133469][ T6480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1071.144360][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1071.156414][ T2911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1071.164723][ T2911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1071.172198][ T2911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1071.180690][ T6480] device veth0_vlan entered promiscuous mode [ 1071.188774][ T6480] device veth1_vlan entered promiscuous mode [ 1071.200031][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1071.207794][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1071.215487][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1071.224888][ T6480] device veth0_macvtap entered promiscuous mode [ 1071.232269][ T6480] device veth1_macvtap entered promiscuous mode [ 1071.242801][ T6480] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1071.250018][ T2911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1071.258601][ T2911] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1071.267653][ T6480] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1071.275716][ T6480] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1071.284610][ T6480] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1071.293349][ T6480] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1071.302336][ T6480] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1071.311527][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1072.577097][ T6698] Bluetooth: hci0: command 0x0409 tx timeout [ 1074.656878][ T2911] Bluetooth: hci0: command 0x041b tx timeout [ 1076.736869][ T2911] Bluetooth: hci0: command 0x040f tx timeout 2020/08/27 20:13:22 executed programs: 1 [ 1078.826875][ T6698] Bluetooth: hci0: command 0x0419 tx timeout [ 1080.321298][ T6741] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1081.056974][ T0] NOHZ: local_softirq_pending 08 [ 1086.653998][ T6741] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811389a800 (size 2048): comm "syz-executor.0", pid 6719, jiffies 4295044405 (age 15.380s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000b28eb5db>] sk_prot_alloc+0xae/0x170 [<000000004798a391>] sk_alloc+0x30/0x330 [<0000000079b47c68>] nr_create+0x67/0x1a0 [<00000000807ab0db>] __sock_create+0x14f/0x230 [<00000000f71b16c0>] __sys_socket+0x60/0x110 [<000000003f7a5c68>] __x64_sys_socket+0x1a/0x20 [<000000006e741920>] do_syscall_64+0x2d/0x70 [<00000000d05f1579>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881292ab0c0 (size 32): comm "syz-executor.0", pid 6719, jiffies 4295044405 (age 15.380s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00 ................ backtrace: [<00000000fbaf9fb2>] selinux_sk_alloc_security+0x46/0xb0 [<0000000061c70cab>] security_sk_alloc+0x33/0x60 [<0000000022557008>] sk_prot_alloc+0xc9/0x170 [<000000004798a391>] sk_alloc+0x30/0x330 [<0000000079b47c68>] nr_create+0x67/0x1a0 [<00000000807ab0db>] __sock_create+0x14f/0x230 [<00000000f71b16c0>] __sys_socket+0x60/0x110 [<000000003f7a5c68>] __x64_sys_socket+0x1a/0x20 [<000000006e741920>] do_syscall_64+0x2d/0x70 [<00000000d05f1579>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888113b14800 (size 2048): comm "syz-executor.0", pid 6730, jiffies 4295045027 (age 9.160s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 06 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<00000000b28eb5db>] sk_prot_alloc+0xae/0x170 [<000000004798a391>] sk_alloc+0x30/0x330 [<0000000079b47c68>] nr_create+0x67/0x1a0 [<00000000807ab0db>] __sock_create+0x14f/0x230 [<00000000f71b16c0>] __sys_socket+0x60/0x110 [<000000003f7a5c68>] __x64_sys_socket+0x1a/0x20 [<000000006e741920>] do_syscall_64+0x2d/0x70 [<00000000d05f1579>] entry_SYSCALL_64_after_hwframe+0x44/0xa9