Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. 2021/01/17 16:38:48 parsed 1 programs 2021/01/17 16:38:55 executed programs: 0 syzkaller login: [ 426.159411][ T8480] IPVS: ftp: loaded support on port[0] = 21 [ 426.219354][ T8480] chnl_net:caif_netlink_parms(): no params data found [ 426.236985][ T8480] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.244292][ T8480] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.251823][ T8480] device bridge_slave_0 entered promiscuous mode [ 426.258685][ T8480] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.268050][ T8480] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.275490][ T8480] device bridge_slave_1 entered promiscuous mode [ 426.285703][ T8480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 426.295480][ T8480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 426.307995][ T8480] team0: Port device team_slave_0 added [ 426.314184][ T8480] team0: Port device team_slave_1 added [ 426.323464][ T8480] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 426.330392][ T8480] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 426.356359][ T8480] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 426.367420][ T8480] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 426.374645][ T8480] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 426.401094][ T8480] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 426.416459][ T8480] device hsr_slave_0 entered promiscuous mode [ 426.422748][ T8480] device hsr_slave_1 entered promiscuous mode [ 426.450744][ T8480] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 426.458340][ T8480] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 426.466069][ T8480] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 426.473664][ T8480] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 426.486455][ T8480] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.493490][ T8480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.500719][ T8480] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.507745][ T8480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.526461][ T8480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 426.535538][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 426.543388][ T4867] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.550711][ T4867] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.558564][ T4867] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 426.567594][ T8480] 8021q: adding VLAN 0 to HW filter on device team0 [ 426.575745][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 426.584081][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.591137][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.600103][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 426.608437][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.615519][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.630330][ T8480] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 426.640862][ T8480] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 426.652136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 426.660324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 426.669057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 426.677127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 426.685179][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 426.692580][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 426.705390][ T8480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 426.712581][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 426.719892][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 426.736268][ T8480] device veth0_vlan entered promiscuous mode [ 426.742759][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 426.751082][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 426.759551][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 426.766950][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 426.776398][ T8480] device veth1_vlan entered promiscuous mode [ 426.788943][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 426.796809][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 426.804803][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 426.814286][ T8480] device veth0_macvtap entered promiscuous mode [ 426.821853][ T8480] device veth1_macvtap entered promiscuous mode [ 426.832150][ T8480] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 426.839373][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 426.848055][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 426.857362][ T8480] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 426.864777][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 426.874032][ T8480] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 426.882950][ T8480] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 426.891672][ T8480] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 426.900361][ T8480] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 426.931593][ T8518] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 426.939411][ T8518] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 426.948013][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 426.962647][ T8199] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 426.970464][ T8199] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 426.977916][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 426.995480][ T8723] device vlan2 entered promiscuous mode [ 427.033342][ T8723] device vlan2 entered promiscuous mode [ 428.221609][ T35] Bluetooth: hci0: command 0x0409 tx timeout [ 430.301115][ T35] Bluetooth: hci0: command 0x041b tx timeout 2021/01/17 16:39:02 executed programs: 1 [ 432.250411][ T8740] device vlan2 entered promiscuous mode [ 432.283088][ T8745] device vlan2 entered promiscuous mode [ 432.320457][ T8752] device vlan2 entered promiscuous mode [ 432.363196][ T8759] device vlan2 entered promiscuous mode [ 432.381000][ T4867] Bluetooth: hci0: command 0x040f tx timeout [ 434.460979][ T35] Bluetooth: hci0: command 0x0419 tx timeout 2021/01/17 16:39:07 executed programs: 3 [ 437.540375][ T8770] device vlan2 entered promiscuous mode [ 437.594110][ T8770] device vlan2 entered promiscuous mode [ 437.640460][ T8781] device vlan2 entered promiscuous mode [ 437.682964][ T8781] device vlan2 entered promiscuous mode [ 437.688534][ T8781] device syz_tun entered promiscuous mode [ 437.695004][ T8781] device syz_tun left promiscuous mode 2021/01/17 16:39:13 executed programs: 5 [ 442.903512][ T8798] device vlan2 entered promiscuous mode [ 442.942914][ T8803] device vlan2 entered promiscuous mode [ 443.010209][ T8810] device vlan2 entered promiscuous mode [ 443.052863][ T8817] device vlan2 entered promiscuous mode [ 444.102368][ T8823] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810f253bc0 (size 64): comm "syz-executor.0", pid 8781, jiffies 4294981042 (age 12.560s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 02 00 00 ................ backtrace: [<000000002c90eaf2>] mrp_request_join+0x153/0x260 [<00000000767f060c>] vlan_mvrp_request_join+0x96/0xa0 [<00000000e31d25da>] vlan_dev_open+0x1e7/0x330 [<00000000321f4874>] __dev_open+0x175/0x260 [<00000000255186cf>] __dev_change_flags+0x2fd/0x390 [<0000000014787d72>] rtnl_configure_link+0x64/0x130 [<00000000b508028e>] __rtnl_newlink+0xa84/0xd80 [<00000000e4ab560a>] rtnl_newlink+0x49/0x70 [<00000000bc6559c4>] rtnetlink_rcv_msg+0x1fc/0x520 [<0000000019075ccf>] netlink_rcv_skb+0x87/0x1d0 [<00000000c41d1eb4>] netlink_unicast+0x392/0x4c0 [<00000000c1a55588>] netlink_sendmsg+0x368/0x6a0 [<00000000461322b5>] sock_sendmsg+0x56/0x80 [<00000000a4b54946>] ____sys_sendmsg+0x36c/0x390 [<00000000748d64db>] ___sys_sendmsg+0x8b/0xd0 [<000000008dec0274>] __sys_sendmsg+0x88/0x100