[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.20' (ECDSA) to the list of known hosts. 2021/01/16 12:57:53 parsed 1 programs 2021/01/16 12:58:00 executed programs: 0 syzkaller login: [ 421.657088][ T8477] IPVS: ftp: loaded support on port[0] = 21 [ 421.720198][ T8477] chnl_net:caif_netlink_parms(): no params data found [ 421.740465][ T8477] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.747518][ T8477] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.754955][ T8477] device bridge_slave_0 entered promiscuous mode [ 421.762024][ T8477] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.769202][ T8477] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.776561][ T8477] device bridge_slave_1 entered promiscuous mode [ 421.787406][ T8477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 421.797504][ T8477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 421.811229][ T8477] team0: Port device team_slave_0 added [ 421.817340][ T8477] team0: Port device team_slave_1 added [ 421.826600][ T8477] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 421.833572][ T8477] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 421.859827][ T8477] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 421.871046][ T8477] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 421.877990][ T8477] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 421.903909][ T8477] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 421.919709][ T8477] device hsr_slave_0 entered promiscuous mode [ 421.926097][ T8477] device hsr_slave_1 entered promiscuous mode [ 421.955239][ T8477] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 421.963038][ T8477] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 421.971016][ T8477] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 421.978714][ T8477] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 421.990560][ T8477] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.997624][ T8477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.004873][ T8477] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.011960][ T8477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.031653][ T8477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 422.040862][ T8572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 422.048471][ T8572] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.056514][ T8572] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.064254][ T8572] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 422.073251][ T8477] 8021q: adding VLAN 0 to HW filter on device team0 [ 422.081617][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 422.090077][ T8699] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.097182][ T8699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.106214][ T8455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 422.114588][ T8455] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.121639][ T8455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.133171][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 422.141350][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 422.153427][ T8477] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 422.163905][ T8477] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 422.175229][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 422.183537][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 422.191762][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 422.200283][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 422.211276][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 422.218602][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 422.228288][ T8477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 422.239894][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 422.252742][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.260958][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.268356][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.276804][ T8477] device veth0_vlan entered promiscuous mode [ 422.285333][ T8477] device veth1_vlan entered promiscuous mode [ 422.297847][ T8477] device veth0_macvtap entered promiscuous mode [ 422.304847][ T8455] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 422.312559][ T8455] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 422.320438][ T8455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 422.328521][ T8455] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 422.337515][ T8477] device veth1_macvtap entered promiscuous mode [ 422.347827][ T8477] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 422.355333][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 422.365109][ T8477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 422.372637][ T8455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 422.382533][ T8477] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.391230][ T8477] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.400172][ T8477] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.408835][ T8477] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.441155][ T8505] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 422.449260][ T8505] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 422.456752][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 422.467804][ T8505] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 422.475920][ T8505] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 422.483390][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 422.500407][ T8721] device vlan2 entered promiscuous mode [ 422.535257][ T8721] device vlan2 entered promiscuous mode [ 423.709499][ T8701] Bluetooth: hci0: command 0x0409 tx timeout [ 425.788911][ T8701] Bluetooth: hci0: command 0x041b tx timeout 2021/01/16 12:58:07 executed programs: 1 [ 427.775318][ T8738] device vlan2 entered promiscuous mode [ 427.810900][ T8743] device vlan2 entered promiscuous mode [ 427.858972][ T8750] device vlan2 entered promiscuous mode [ 427.878948][ T8701] Bluetooth: hci0: command 0x040f tx timeout [ 427.901209][ T8750] device vlan2 entered promiscuous mode [ 429.948935][ T8455] Bluetooth: hci0: command 0x0419 tx timeout 2021/01/16 12:58:13 executed programs: 3 [ 434.044144][ T8766] device vlan2 entered promiscuous mode [ 434.090989][ T8771] device vlan2 entered promiscuous mode [ 434.138099][ T8777] device vlan2 entered promiscuous mode [ 434.180997][ T8777] device vlan2 entered promiscuous mode [ 434.186559][ T8777] device syz_tun entered promiscuous mode [ 434.192952][ T8777] device syz_tun left promiscuous mode [ 440.200223][ T8789] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811617cd00 (size 64): comm "syz-executor.0", pid 8777, jiffies 4294980687 (age 8.120s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 02 00 00 ................ backtrace: [<00000000f841a0c8>] mrp_request_join+0x153/0x260 [<0000000013d7275e>] vlan_mvrp_request_join+0x96/0xa0 [<0000000085e9c38f>] vlan_dev_open+0x1e7/0x330 [<000000003597cc7f>] __dev_open+0x175/0x260 [<00000000c87a8d92>] __dev_change_flags+0x2fd/0x390 [<0000000051473069>] rtnl_configure_link+0x64/0x130 [<0000000050aa9cce>] __rtnl_newlink+0xa84/0xd80 [<000000004d1dc9c5>] rtnl_newlink+0x49/0x70 [<00000000c485792c>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000b759fb0e>] netlink_rcv_skb+0x87/0x1d0 [<000000007e16cd45>] netlink_unicast+0x392/0x4c0 [<000000004f0a471e>] netlink_sendmsg+0x368/0x6a0 [<0000000029af6280>] sock_sendmsg+0x56/0x80 [<0000000046b68bb8>] ____sys_sendmsg+0x36c/0x390 [<0000000095ac8df9>] ___sys_sendmsg+0x8b/0xd0 [<00000000a8df8e05>] __sys_sendmsg+0x88/0x100