[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.134' (ECDSA) to the list of known hosts. 2020/03/30 16:27:20 parsed 1 programs syzkaller login: [ 71.443577][ T3826] kmemleak: Automatic memory scanning thread ended 2020/03/30 16:27:31 executed programs: 0 [ 79.122043][ T25] audit: type=1400 audit(1585585651.763:8): avc: denied { execmem } for pid=6640 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 79.129556][ T6641] IPVS: ftp: loaded support on port[0] = 21 [ 79.178397][ T6641] chnl_net:caif_netlink_parms(): no params data found [ 79.293822][ T6641] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.301103][ T6641] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.309183][ T6641] device bridge_slave_0 entered promiscuous mode [ 79.316404][ T6641] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.323581][ T6641] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.330843][ T6641] device bridge_slave_1 entered promiscuous mode [ 79.340682][ T6641] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.350590][ T6641] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.363065][ T6641] team0: Port device team_slave_0 added [ 79.369134][ T6641] team0: Port device team_slave_1 added [ 79.378273][ T6641] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 79.386054][ T6641] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 79.412524][ T6641] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 79.423823][ T6641] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 79.430888][ T6641] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 79.458763][ T6641] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 79.503634][ T6641] device hsr_slave_0 entered promiscuous mode [ 79.542877][ T6641] device hsr_slave_1 entered promiscuous mode [ 79.602769][ T6641] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.643873][ T6641] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.683545][ T6641] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.723511][ T6641] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.797449][ T6641] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.805077][ T6641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.812268][ T6641] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.819669][ T6641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.835553][ T6641] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.844602][ T6844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.852114][ T6844] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.869775][ T6844] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.877477][ T6844] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 79.886322][ T6641] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.894622][ T3580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.902953][ T3580] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.909974][ T3580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.924140][ T6641] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 79.934672][ T6641] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 79.945983][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.954569][ T6846] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.961756][ T6846] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.969544][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 79.978094][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.986352][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.994801][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 80.002860][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 80.010177][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 80.020798][ T6844] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 80.028390][ T6844] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 80.037601][ T6641] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 80.048319][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 80.060469][ T6641] device veth0_vlan entered promiscuous mode [ 80.066960][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.075818][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 80.083458][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 80.092385][ T6641] device veth1_vlan entered promiscuous mode [ 80.103138][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 80.110819][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 80.118928][ T6846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 80.128159][ T6641] device veth0_macvtap entered promiscuous mode [ 80.135564][ T6641] device veth1_macvtap entered promiscuous mode [ 80.145074][ T6641] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.152287][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.161158][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 80.169920][ T6641] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 80.177689][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.220998][ T6866] ubi0: attaching mtd0 [ 80.226582][ T6866] ubi0: scanning is finished [ 80.231221][ T6866] ubi0: empty MTD device detected [ 80.273152][ T6866] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 80.280637][ T6866] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 80.288511][ T6866] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 80.295718][ T6866] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 80.303550][ T6866] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 80.310327][ T6866] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 80.318739][ T6866] ubi0: max/mean erase counter: 0/0, WL threshold: 4096, image sequence number: 4270275166 [ 80.329032][ T6866] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 80.339576][ T6870] ubi0: background thread "ubi_bgt0d" started, PID 6870 2020/03/30 16:27:38 executed programs: 1 [ 86.138739][ T6875] ubi0: detaching mtd0 [ 86.143563][ T6875] ubi0: mtd0 is detached [ 86.148005][ T6875] ubi0: attaching mtd0 [ 86.153109][ T6875] ubi0: scanning is finished [ 86.212175][ T6875] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 86.219651][ T6875] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 86.227159][ T6875] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 86.234422][ T6875] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 86.242731][ T6875] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 86.249832][ T6875] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 86.258248][ T6875] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 4270275166 [ 86.268486][ T6875] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 86.279270][ T6878] ubi0: background thread "ubi_bgt0d" started, PID 6878 [ 86.290914][ T6881] ubi0: detaching mtd0 [ 86.295513][ T6881] ubi0: mtd0 is detached [ 86.299901][ T6881] ubi0: attaching mtd0 [ 86.304700][ T6881] ubi0: scanning is finished [ 86.340042][ T6881] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 86.348022][ T6881] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 86.355528][ T6881] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 86.362679][ T6881] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 86.370139][ T6881] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 86.377438][ T6881] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 86.385665][ T6881] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 4270275166 [ 86.395833][ T6881] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 86.405949][ T6887] ubi0: background thread "ubi_bgt0d" started, PID 6887 [ 92.004083][ T6888] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888127e83740 (size 32): comm "syz-executor.0", pid 6866, jiffies 4294945297 (age 14.270s) hex dump (first 32 bytes): 00 01 00 00 00 00 ad de 22 01 00 00 00 00 ad de ........"....... 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 ................ backtrace: [<00000000af30a1db>] erase_aeb+0x25/0x110 [<0000000040598d4a>] ubi_wl_init+0x193/0x5c0 [<00000000c35bd891>] ubi_attach+0x611/0x18ba [<0000000000d9a160>] ubi_attach_mtd_dev+0x584/0xca0 [<000000002a04a6dd>] ctrl_cdev_ioctl+0x143/0x1b0 [<000000008d198432>] ksys_ioctl+0xa6/0xd0 [<000000005232a98c>] __x64_sys_ioctl+0x1a/0x20 [<00000000c5515122>] do_syscall_64+0x6e/0x220 [<00000000a8b6be90>] entry_SYSCALL_64_after_hwframe+0x44/0xa9