[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.145' (ECDSA) to the list of known hosts. syzkaller login: [ 43.728203][ T8413] IPVS: ftp: loaded support on port[0] = 21 [ 43.752091][ T8413] chnl_net:caif_netlink_parms(): no params data found [ 43.769368][ T8413] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.776451][ T8413] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.783630][ T8413] device bridge_slave_0 entered promiscuous mode [ 43.791132][ T8413] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.798225][ T8413] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.805408][ T8413] device bridge_slave_1 entered promiscuous mode [ 43.814935][ T8413] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 43.824540][ T8413] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 43.836465][ T8413] team0: Port device team_slave_0 added [ 43.842407][ T8413] team0: Port device team_slave_1 added [ 43.851138][ T8413] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 43.858183][ T8413] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 43.884144][ T8413] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 43.894990][ T8413] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 43.902018][ T8413] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 43.927890][ T8413] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 43.942277][ T8413] device hsr_slave_0 entered promiscuous mode [ 43.948519][ T8413] device hsr_slave_1 entered promiscuous mode [ 43.973535][ T8413] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 43.980968][ T8413] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 43.988386][ T8413] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 43.995570][ T8413] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 44.006219][ T8413] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.013228][ T8413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.020440][ T8413] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.027463][ T8413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.044227][ T8413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.052692][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.060678][ T4885] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.068100][ T4885] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.075428][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 44.084055][ T8413] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.092210][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.100605][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.107636][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.122099][ T8413] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 44.132481][ T8413] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 44.143369][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.151737][ T4885] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.158757][ T4885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.166321][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.174322][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 44.182460][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.190420][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.198338][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 44.205548][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 44.217232][ T8413] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 44.226413][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 44.233714][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 44.242536][ T8620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.254277][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.262329][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.269847][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.277983][ T8413] device veth0_vlan entered promiscuous mode [ 44.285533][ T8413] device veth1_vlan entered promiscuous mode [ 44.296125][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 44.303749][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 44.312459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.321222][ T8413] device veth0_macvtap entered promiscuous mode [ 44.328409][ T8413] device veth1_macvtap entered promiscuous mode [ 44.337941][ T8413] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 44.345124][ T8620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.353737][ T8620] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 44.362492][ T8413] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 44.369928][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 44.378988][ T8413] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.387744][ T8413] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.396440][ T8413] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.405204][ T8413] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.423420][ T8622] device vlan2 entered promiscuous mode [ 44.429020][ T8622] device batadv0 entered promiscuous mode [ 44.434915][ T8622] device batadv0 left promiscuous mode executing program [ 50.379329][ T8627] device vlan2 entered promiscuous mode [ 50.384906][ T8627] device batadv0 entered promiscuous mode [ 50.390906][ T8627] device batadv0 left promiscuous mode [ 51.341242][ T8413] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888114024900 (size 64): comm "syz-executor359", pid 8622, jiffies 4294941706 (age 13.860s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 00 ................ backtrace: [<0000000078d1f78f>] garp_request_join+0x138/0x220 [<000000008627580d>] vlan_gvrp_request_join+0x96/0xa0 [<000000005ceedb79>] vlan_dev_open+0x1f9/0x330 [<00000000b1cd1f9e>] __dev_open+0x175/0x260 [<000000002e6270d3>] __dev_change_flags+0x2fd/0x390 [<0000000059728ac5>] rtnl_configure_link+0x64/0x130 [<0000000015616537>] __rtnl_newlink+0xa84/0xd80 [<000000008bcd7fef>] rtnl_newlink+0x49/0x70 [<0000000059e823f3>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000255b0add>] netlink_rcv_skb+0x87/0x1d0 [<00000000aa9becab>] netlink_unicast+0x392/0x4c0 [<00000000767305f0>] netlink_sendmsg+0x368/0x6a0 [<000000009d4c6bdc>] sock_sendmsg+0x56/0x80 [<0000000036613049>] ____sys_sendmsg+0x36c/0x390 [<0000000082ea6815>] ___sys_sendmsg+0x8b/0xd0 [<0000000008bed5b2>] __sys_sendmsg+0x88/0x100 BUG: memory leak unreferenced object 0xffff888114024840 (size 64): comm "syz-executor359", pid 8627, jiffies 4294942302 (age 7.900s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 00 ................ backtrace: [<0000000078d1f78f>] garp_request_join+0x138/0x220 [<000000008627580d>] vlan_gvrp_request_join+0x96/0xa0 [<000000005ceedb79>] vlan_dev_open+0x1f9/0x330 [<00000000b1cd1f9e>] __dev_open+0x175/0x260 [<000000002e6270d3>] __dev_change_flags+0x2fd/0x390 [<0000000059728ac5>] rtnl_configure_link+0x64/0x130 [<0000000015616537>] __rtnl_newlink+0xa84/0xd80 [<000000008bcd7fef>] rtnl_newlink+0x49/0x70 [<0000000059e823f3>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000255b0add>] netlink_rcv_skb+0x87/0x1d0 [<00000000aa9becab>] netlink_unicast+0x392/0x4c0 [<00000000767305f0>] netlink_sendmsg+0x368/0x6a0 [<000000009d4c6bdc>] sock_sendmsg+0x56/0x80 [<0000000036613049>] ____sys_sendmsg+0x36c/0x390 [<0000000082ea6815>] ___sys_sendmsg+0x8b/0xd0 [<0000000008bed5b2>] __sys_sendmsg+0x88/0x100 [ 58.219925][ T8413] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)