Warning: Permanently added '10.128.1.55' (ECDSA) to the list of known hosts.
2020/06/07 08:27:05 parsed 1 programs
syzkaller login: [   82.860170][ T3650] kmemleak: Automatic memory scanning thread ended
2020/06/07 08:27:12 executed programs: 0
[   90.427865][   T26] audit: type=1400 audit(1591518432.930:8): avc:  denied  { execmem } for  pid=6450 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
[   90.440374][ T6451] IPVS: ftp: loaded support on port[0] = 21
[   90.475935][ T6451] chnl_net:caif_netlink_parms(): no params data found
[   90.552994][ T6451] bridge0: port 1(bridge_slave_0) entered blocking state
[   90.561724][ T6451] bridge0: port 1(bridge_slave_0) entered disabled state
[   90.569602][ T6451] device bridge_slave_0 entered promiscuous mode
[   90.577035][ T6451] bridge0: port 2(bridge_slave_1) entered blocking state
[   90.584734][ T6451] bridge0: port 2(bridge_slave_1) entered disabled state
[   90.593397][ T6451] device bridge_slave_1 entered promiscuous mode
[   90.603414][ T6451] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   90.613119][ T6451] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   90.626125][ T6451] team0: Port device team_slave_0 added
[   90.632319][ T6451] team0: Port device team_slave_1 added
[   90.641040][ T6451] batman_adv: batadv0: Adding interface: batadv_slave_0
[   90.648288][ T6451] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   90.679117][ T6451] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   90.690368][ T6451] batman_adv: batadv0: Adding interface: batadv_slave_1
[   90.697542][ T6451] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   90.723847][ T6451] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   90.774837][ T6451] device hsr_slave_0 entered promiscuous mode
[   90.813325][ T6451] device hsr_slave_1 entered promiscuous mode
[   90.872327][ T6451] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   90.924178][ T6451] netdevsim netdevsim0 netdevsim1: renamed from eth1
[   90.954087][ T6451] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   91.014014][ T6451] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   91.057901][ T6451] bridge0: port 2(bridge_slave_1) entered blocking state
[   91.065069][ T6451] bridge0: port 2(bridge_slave_1) entered forwarding state
[   91.075750][ T6451] bridge0: port 1(bridge_slave_0) entered blocking state
[   91.082823][ T6451] bridge0: port 1(bridge_slave_0) entered forwarding state
[   91.099189][ T6451] 8021q: adding VLAN 0 to HW filter on device bond0
[   91.107629][   T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   91.115768][   T16] bridge0: port 1(bridge_slave_0) entered disabled state
[   91.122892][   T16] bridge0: port 2(bridge_slave_1) entered disabled state
[   91.131042][   T16] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[   91.139809][ T6451] 8021q: adding VLAN 0 to HW filter on device team0
[   91.147741][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   91.156165][   T23] bridge0: port 1(bridge_slave_0) entered blocking state
[   91.163201][   T23] bridge0: port 1(bridge_slave_0) entered forwarding state
[   91.177384][ T6451] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   91.187733][ T6451] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   91.198947][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   91.207608][   T23] bridge0: port 2(bridge_slave_1) entered blocking state
[   91.214629][   T23] bridge0: port 2(bridge_slave_1) entered forwarding state
[   91.222130][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   91.230477][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   91.238768][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   91.246988][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   91.256068][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   91.263527][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   91.275400][ T6451] 8021q: adding VLAN 0 to HW filter on device batadv0
[   91.283248][   T16] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   91.290560][   T16] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   91.306653][ T6451] device veth0_vlan entered promiscuous mode
[   91.313966][ T6654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   91.322266][ T6654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   91.330559][ T6654] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   91.338126][ T6654] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   91.347543][ T6451] device veth1_vlan entered promiscuous mode
[   91.357669][   T16] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   91.365651][   T16] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   91.373829][   T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   91.382686][ T6451] device veth0_macvtap entered promiscuous mode
[   91.390209][ T6451] device veth1_macvtap entered promiscuous mode
[   91.400546][ T6451] batman_adv: batadv0: Interface activated: batadv_slave_0
[   91.408637][ T6654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   91.417067][ T6654] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   91.426317][ T6451] batman_adv: batadv0: Interface activated: batadv_slave_1
[   91.433988][   T16] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   91.480744][ T6676] ubi0: attaching mtd0
[   91.485484][ T6676] ubi0: scanning is finished
[   91.490093][ T6676] ubi0: empty MTD device detected
[   91.525238][ T6676] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB)
[   91.532705][ T6676] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes
[   91.540524][ T6676] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1
[   91.548969][ T6676] ubi0: VID header offset: 64 (aligned 64), data offset: 128
[   91.556568][ T6676] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0
[   91.563548][ T6676] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23
[   91.571515][ T6676] ubi0: max/mean erase counter: 0/0, WL threshold: 4096, image sequence number: 1859604165
[   91.582274][ T6676] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0
[   91.592487][ T6680] ubi0: background thread "ubi_bgt0d" started, PID 6680
[   91.592712][ T6676] ubi0: detaching mtd0
[   91.604116][ T6676] ubi0: mtd0 is detached
2020/06/07 08:27:19 executed programs: 1
[   97.309452][ T6688] ubi0: attaching mtd0
[   97.313979][ T6688] ubi0: scanning is finished
[   97.372824][ T6688] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB)
[   97.381666][ T6688] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes
[   97.389294][ T6688] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1
[   97.397032][ T6688] ubi0: VID header offset: 64 (aligned 64), data offset: 128
[   97.404682][ T6688] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0
[   97.411627][ T6688] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23
[   97.419974][ T6688] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1859604165
[   97.430221][ T6688] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0
[   97.441076][ T6689] ubi0: background thread "ubi_bgt0d" started, PID 6689
[   97.442046][ T6688] ubi0: detaching mtd0
[   97.452513][ T6688] ubi0: mtd0 is detached
[   97.462191][ T6694] ubi0: attaching mtd0
[   97.466562][ T6694] ubi0: scanning is finished
[   97.512935][ T6694] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB)
[   97.521312][ T6694] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes
[   97.528941][ T6694] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1
[   97.536868][ T6694] ubi0: VID header offset: 64 (aligned 64), data offset: 128
[   97.547175][ T6694] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0
[   97.554712][ T6694] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23
[   97.562962][ T6694] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1859604165
[   97.573172][ T6694] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0
[   97.583324][ T6698] ubi0: background thread "ubi_bgt0d" started, PID 6698
[   97.583445][ T6694] ubi0: detaching mtd0
[   97.595037][ T6694] ubi0: mtd0 is detached
[  100.821826][    T0] NOHZ: local_softirq_pending 08
[  103.072910][ T6702] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff88811f1706c0 (size 32):
  comm "syz-executor.0", pid 6676, jiffies 4294946395 (age 14.000s)
  hex dump (first 32 bytes):
    b8 06 17 1f 81 88 ff ff 60 b4 15 1f 81 88 ff ff  ........`.......
    80 ee 85 83 ff ff ff ff 01 00 00 00 02 00 00 00  ................
  backtrace:
    [<00000000e7d86de0>] erase_aeb+0x25/0x110
    [<000000005ae12c39>] ubi_wl_init+0x193/0x5c0
    [<000000002528b114>] ubi_attach+0x611/0x18ba
    [<000000005d01ae92>] ubi_attach_mtd_dev+0x665/0xcc0
    [<00000000b9f456ed>] ctrl_cdev_ioctl+0x144/0x1b0
    [<00000000e97988aa>] ksys_ioctl+0xa6/0xd0
    [<00000000d06779ef>] __x64_sys_ioctl+0x1a/0x20
    [<000000000f0891bb>] do_syscall_64+0x6e/0x220
    [<0000000051a8678e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9