[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.5' (ECDSA) to the list of known hosts. syzkaller login: [ 49.975227][ T8422] IPVS: ftp: loaded support on port[0] = 21 [ 50.001113][ T8422] chnl_net:caif_netlink_parms(): no params data found [ 50.020666][ T8422] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.027785][ T8422] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.035486][ T8422] device bridge_slave_0 entered promiscuous mode [ 50.042680][ T8422] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.049965][ T8422] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.057301][ T8422] device bridge_slave_1 entered promiscuous mode [ 50.067465][ T8422] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.077485][ T8422] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.090165][ T8422] team0: Port device team_slave_0 added [ 50.096217][ T8422] team0: Port device team_slave_1 added [ 50.106214][ T8422] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 50.113370][ T8422] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.139336][ T8422] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 50.150612][ T8422] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 50.157543][ T8422] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.183616][ T8422] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 50.198828][ T8422] device hsr_slave_0 entered promiscuous mode [ 50.205056][ T8422] device hsr_slave_1 entered promiscuous mode [ 50.233742][ T8422] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 50.241420][ T8422] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 50.248786][ T8422] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 50.256117][ T8422] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 50.267518][ T8422] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.274565][ T8422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.281801][ T8422] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.288816][ T8422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.307191][ T8422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.315919][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.324144][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.331621][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.339280][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.347783][ T8422] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.356003][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.364199][ T2875] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.371250][ T2875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.386712][ T8422] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 50.397099][ T8422] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 50.408387][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.416854][ T2875] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.423877][ T2875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.431780][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.439970][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.447962][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.455923][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.463893][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.471262][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.483849][ T8422] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 50.490923][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 50.498237][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 50.509790][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.522373][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.530529][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.537872][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.546494][ T8422] device veth0_vlan entered promiscuous mode [ 50.554679][ T8422] device veth1_vlan entered promiscuous mode [ 50.565953][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 50.573874][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 50.581893][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.591024][ T8422] device veth0_macvtap entered promiscuous mode [ 50.598423][ T8422] device veth1_macvtap entered promiscuous mode [ 50.608852][ T8422] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 50.616060][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.624611][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready executing program [ 50.633856][ T8422] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 50.641746][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.650592][ T8422] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.659789][ T8422] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.668463][ T8422] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.677237][ T8422] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.697031][ T8631] device vxcan1 entered promiscuous mode [ 50.702717][ T8631] device vlan2 entered promiscuous mode [ 50.708333][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready [ 50.715737][ T8631] device vxcan1 left promiscuous mode executing program [ 55.898854][ T8636] device vxcan1 entered promiscuous mode [ 55.904701][ T8636] device vlan2 entered promiscuous mode [ 55.910695][ T8636] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready [ 55.918225][ T8636] device vxcan1 left promiscuous mode [ 56.951981][ T8422] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881139e39c0 (size 64): comm "syz-executor324", pid 8631, jiffies 4294942332 (age 12.400s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 0f fe ................ backtrace: [<000000009f7580f4>] garp_request_join+0x138/0x220 [<00000000aa99179e>] vlan_gvrp_request_join+0x96/0xa0 [<00000000f466f4c1>] vlan_dev_open+0x1f9/0x330 [<000000001190746d>] __dev_open+0x175/0x260 [<0000000032a2893c>] __dev_change_flags+0x2fd/0x390 [<00000000b0b12880>] rtnl_configure_link+0x64/0x130 [<0000000054e6d06c>] __rtnl_newlink+0xa84/0xd80 [<000000004a51fe0d>] rtnl_newlink+0x49/0x70 [<0000000019dae732>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000848a266e>] netlink_rcv_skb+0x87/0x1d0 [<00000000223e9d93>] netlink_unicast+0x392/0x4c0 [<00000000c6e5e3d0>] netlink_sendmsg+0x368/0x6a0 [<000000000f449c08>] sock_sendmsg+0x56/0x80 [<00000000b3ab23ae>] ____sys_sendmsg+0x36c/0x390 [<00000000603dd7ad>] ___sys_sendmsg+0x8b/0xd0 [<0000000028e91191>] __sys_sendmsg+0x88/0x100 BUG: memory leak unreferenced object 0xffff8881139e3980 (size 64): comm "syz-executor324", pid 8631, jiffies 4294942332 (age 12.400s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 02 0f fe ................ backtrace: [<000000000b0a57fc>] mrp_request_join+0x153/0x260 [<00000000d8480796>] vlan_mvrp_request_join+0x96/0xa0 [<000000004c7328fd>] vlan_dev_open+0x1e7/0x330 [<000000001190746d>] __dev_open+0x175/0x260 [<0000000032a2893c>] __dev_change_flags+0x2fd/0x390 [<00000000b0b12880>] rtnl_configure_link+0x64/0x130 [<0000000054e6d06c>] __rtnl_newlink+0xa84/0xd80 [<000000004a51fe0d>] rtnl_newlink+0x49/0x70 [<0000000019dae732>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000848a266e>] netlink_rcv_skb+0x87/0x1d0 [<00000000223e9d93>] netlink_unicast+0x392/0x4c0 [<00000000c6e5e3d0>] netlink_sendmsg+0x368/0x6a0 [<000000000f449c08>] sock_sendmsg+0x56/0x80 [<00000000b3ab23ae>] ____sys_sendmsg+0x36c/0x390 [<00000000603dd7ad>] ___sys_sendmsg+0x8b/0xd0 [<0000000028e91191>] __sys_sendmsg+0x88/0x100