[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.148' (ECDSA) to the list of known hosts. 2021/05/24 03:35:37 parsed 1 programs 2021/05/24 03:35:44 executed programs: 0 syzkaller login: [ 596.687623][ T8440] chnl_net:caif_netlink_parms(): no params data found [ 596.717632][ T8440] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.724818][ T8440] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.732541][ T8440] device bridge_slave_0 entered promiscuous mode [ 596.739655][ T8440] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.746808][ T8440] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.754133][ T8440] device bridge_slave_1 entered promiscuous mode [ 596.765236][ T8440] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 596.777189][ T8440] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 596.790303][ T8440] team0: Port device team_slave_0 added [ 596.796661][ T8440] team0: Port device team_slave_1 added [ 596.806102][ T8440] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 596.813297][ T8440] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 596.839305][ T8440] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 596.850520][ T8440] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 596.857509][ T8440] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 596.883605][ T8440] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 596.898823][ T8440] device hsr_slave_0 entered promiscuous mode [ 596.905344][ T8440] device hsr_slave_1 entered promiscuous mode [ 596.932858][ T8440] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 596.940554][ T8440] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 596.948585][ T8440] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 596.956546][ T8440] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 596.968742][ T8440] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.975793][ T8440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 596.983099][ T8440] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.990148][ T8440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.008592][ T8440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 597.018664][ T8580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 597.027104][ T8580] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.034482][ T8580] bridge0: port 2(bridge_slave_1) entered disabled state [ 597.042544][ T8580] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 597.051800][ T8440] 8021q: adding VLAN 0 to HW filter on device team0 [ 597.060111][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 597.068697][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.075744][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.085112][ T8580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 597.093446][ T8580] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.100972][ T8580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 597.111800][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 597.120137][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 597.129444][ T8661] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 597.140259][ T8440] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 597.150737][ T8440] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 597.162069][ T8580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 597.170261][ T8580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 597.178520][ T8580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 597.189522][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 597.197317][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 597.207008][ T8440] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 597.218320][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 597.230155][ T8580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 597.238608][ T8580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 597.246481][ T8580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 597.255571][ T8440] device veth0_vlan entered promiscuous mode [ 597.263828][ T8440] device veth1_vlan entered promiscuous mode [ 597.275632][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 597.283547][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 597.292259][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 597.301669][ T8440] device veth0_macvtap entered promiscuous mode [ 597.309414][ T8440] device veth1_macvtap entered promiscuous mode [ 597.319607][ T8440] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 597.327707][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 597.336200][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 597.345898][ T8440] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 597.353330][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 597.362887][ T8440] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 597.371635][ T8440] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 597.381648][ T8440] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 597.391697][ T8440] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 597.424531][ T8589] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 597.432780][ T8589] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 597.443345][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 597.452507][ T8589] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 597.460653][ T8589] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 597.468382][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 597.485233][ T8684] device vlan2 entered promiscuous mode [ 597.491188][ T8684] device batadv0 entered promiscuous mode [ 597.497487][ T8684] device batadv0 left promiscuous mode [ 598.704861][ T8580] Bluetooth: hci0: command 0x0409 tx timeout [ 600.784763][ T3198] Bluetooth: hci0: command 0x041b tx timeout [ 602.874625][ T3198] Bluetooth: hci0: command 0x040f tx timeout 2021/05/24 03:35:52 executed programs: 1 [ 603.144991][ T8695] device vlan2 entered promiscuous mode [ 603.150709][ T8695] device batadv0 entered promiscuous mode [ 603.157173][ T8695] device batadv0 left promiscuous mode [ 603.204128][ T8700] device vlan2 entered promiscuous mode [ 603.209766][ T8700] device batadv0 entered promiscuous mode [ 603.216564][ T8700] device batadv0 left promiscuous mode [ 604.458380][ T8707] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 604.944417][ T3198] Bluetooth: hci0: command 0x0419 tx timeout [ 610.909089][ T8707] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810620d140 (size 64): comm "syz-executor.0", pid 8684, jiffies 4294997022 (age 13.480s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 00 ................ backtrace: [] garp_request_join+0x138/0x220 [] vlan_gvrp_request_join+0x96/0xa0 [] vlan_dev_open+0x1f9/0x330 [] __dev_open+0x175/0x260 [] __dev_change_flags+0x2fa/0x390 [] rtnl_configure_link+0x64/0x130 [] __rtnl_newlink+0xa74/0xdb0 [] rtnl_newlink+0x49/0x70 [] rtnetlink_rcv_msg+0x1fc/0x520 [] netlink_rcv_skb+0x87/0x1d0 [] netlink_unicast+0x392/0x4c0 [] netlink_sendmsg+0x368/0x6a0 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0x8b/0xd0 [] __sys_sendmsg+0x88/0x100 BUG: memory leak unreferenced object 0xffff88810189c6c0 (size 64): comm "syz-executor.0", pid 8695, jiffies 4294997588 (age 7.820s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 00 ................ backtrace: [] garp_request_join+0x138/0x220 [] vlan_gvrp_request_join+0x96/0xa0 [] vlan_dev_open+0x1f9/0x330 [] __dev_open+0x175/0x260 [] __dev_change_flags+0x2fa/0x390 [] rtnl_configure_link+0x64/0x130 [] __rtnl_newlink+0xa74/0xdb0 [] rtnl_newlink+0x49/0x70 [] rtnetlink_rcv_msg+0x1fc/0x520 [] netlink_rcv_skb+0x87/0x1d0 [] netlink_unicast+0x392/0x4c0 [] netlink_sendmsg+0x368/0x6a0 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0x8b/0xd0 [] __sys_sendmsg+0x88/0x100 BUG: memory leak unreferenced object 0xffff888119013480 (size 64): comm "syz-executor.0", pid 8700, jiffies 4294997593 (age 7.770s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 00 ................ backtrace: [] garp_request_join+0x138/0x220 [] vlan_gvrp_request_join+0x96/0xa0 [] vlan_dev_open+0x1f9/0x330 [] __dev_open+0x175/0x260 [] __dev_change_flags+0x2fa/0x390 [] rtnl_configure_link+0x64/0x130 [] __rtnl_newlink+0xa74/0xdb0 [] rtnl_newlink+0x49/0x70 [] rtnetlink_rcv_msg+0x1fc/0x520 [] netlink_rcv_skb+0x87/0x1d0 [] netlink_unicast+0x392/0x4c0 [] netlink_sendmsg+0x368/0x6a0 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0x8b/0xd0 [] __sys_sendmsg+0x88/0x100