[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.153' (ECDSA) to the list of known hosts. syzkaller login: [ 48.993784][ T8463] IPVS: ftp: loaded support on port[0] = 21 [ 49.024018][ T8463] chnl_net:caif_netlink_parms(): no params data found [ 49.043770][ T8463] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.051054][ T8463] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.058762][ T8463] device bridge_slave_0 entered promiscuous mode [ 49.066621][ T8463] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.073805][ T8463] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.081118][ T8463] device bridge_slave_1 entered promiscuous mode [ 49.091524][ T8463] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 49.101461][ T8463] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.114530][ T8463] team0: Port device team_slave_0 added [ 49.120723][ T8463] team0: Port device team_slave_1 added [ 49.129988][ T8463] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 49.136973][ T8463] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 49.162906][ T8463] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 49.174148][ T8463] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 49.181074][ T8463] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 49.207076][ T8463] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 49.222440][ T8463] device hsr_slave_0 entered promiscuous mode [ 49.228818][ T8463] device hsr_slave_1 entered promiscuous mode [ 49.259308][ T8463] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 49.268007][ T8463] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 49.276054][ T8463] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 49.283823][ T8463] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 49.296025][ T8463] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.303204][ T8463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.310505][ T8463] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.317575][ T8463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.336711][ T8463] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.345734][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.355343][ T3154] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.362615][ T3154] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.370477][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 49.379477][ T8463] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.388152][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.396838][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.403996][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.412845][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.421323][ T3759] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.428371][ T3759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.444002][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.452303][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.460621][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.468947][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.477414][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 49.485283][ T8463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 49.490479][ T8463] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.514179][ T8463] device veth0_vlan entered promiscuous mode [ 49.516042][ T8463] device veth1_vlan entered promiscuous mode [ 49.521916][ T8463] device veth0_macvtap entered promiscuous mode [ 49.523011][ T8463] device veth1_macvtap entered promiscuous mode [ 49.540693][ T8463] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.555886][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 49.564191][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 49.571612][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.580285][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.589168][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.597282][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.604977][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.612419][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 49.620215][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 49.628324][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.636768][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 49.645980][ T8463] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.653432][ T3154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.663338][ T8463] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 49.672030][ T8463] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.681207][ T8463] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.690298][ T8463] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.711003][ T8671] device vxcan1 entered promiscuous mode [ 49.716754][ T8671] device vlan2 entered promiscuous mode [ 49.722511][ T8671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready [ 49.730178][ T8671] device vxcan1 left promiscuous mode executing program [ 54.937593][ T8676] device vxcan1 entered promiscuous mode [ 54.943289][ T8676] device vlan2 entered promiscuous mode [ 54.948919][ T8676] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready [ 54.956465][ T8676] device vxcan1 left promiscuous mode [ 56.045306][ T8463] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 62.167892][ T8463] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888113c61680 (size 64): comm "syz-executor737", pid 8671, jiffies 4294942244 (age 12.520s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 02 00 00 ................ backtrace: [<0000000065d7bce2>] mrp_request_join+0x153/0x260 [<000000009a657e58>] vlan_mvrp_request_join+0x96/0xa0 [<00000000305c949f>] vlan_dev_open+0x1e7/0x330 [<000000003abaf0b1>] __dev_open+0x175/0x260 [<00000000f94f0387>] __dev_change_flags+0x2fd/0x390 [<00000000f270356a>] rtnl_configure_link+0x64/0x130 [<00000000f2a0eaca>] __rtnl_newlink+0xa84/0xd80 [<000000003bd65dfb>] rtnl_newlink+0x49/0x70 [<000000006e718de1>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000251586d5>] netlink_rcv_skb+0x87/0x1d0 [<000000000b775e59>] netlink_unicast+0x392/0x4c0 [<00000000800b352a>] netlink_sendmsg+0x368/0x6a0 [<00000000d79b2786>] sock_sendmsg+0x56/0x80 [<000000003f5603e8>] ____sys_sendmsg+0x36c/0x390 [<00000000d84cac39>] ___sys_sendmsg+0x8b/0xd0 [<00000000edbd4b97>] __sys_sendmsg+0x88/0x100 BUG: memory leak unreferenced object 0xffff888113c61600 (size 64): comm "syz-executor737", pid 8676, jiffies 4294942767 (age 7.290s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 00 ................ backtrace: [<00000000b59a7e30>] garp_request_join+0x138/0x220 [<00000000641cd52c>] vlan_gvrp_request_join+0x96/0xa0 [<000000002896f298>] vlan_dev_open+0x1f9/0x330 [<000000003abaf0b1>] __dev_open+0x175/0x260 [<00000000f94f0387>] __dev_change_flags+0x2fd/0x390 [<00000000f270356a>] rtnl_configure_link+0x64/0x130 [<00000000f2a0eaca>] __rtnl_newlink+0xa84/0xd80 [<000000003bd65dfb>] rtnl_newlink+0x49/0x70 [<000000006e718de1>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000251586d5>] netlink_rcv_skb+0x87/0x1d0 [<000000000b775e59>] netlink_unicast+0x392/0x4c0 [<00000000800b352a>] netlink_sendmsg+0x368/0x6a0 [<00000000d79b2786>] sock_sendmsg+0x56/0x80 [<000000003f5603e8>] ____sys_sendmsg+0x36c/0x390 [<00000000d84cac39>] ___sys_sendmsg+0x8b/0xd0 [<00000000edbd4b97>] __sys_sendmsg+0x88/0x100 BUG: memory leak unreferenced object 0xffff888113b76ec0 (size 64): comm "syz-executor737", pid 8676, jiffies 4294942767 (age 7.290s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 02 00 00 ................ backtrace: [<0000000065d7bce2>] mrp_request_join+0x153/0x260 [<000000009a657e58>] vlan_mvrp_request_join+0x96/0xa0 [<00000000305c949f>] vlan_dev_open+0x1e7/0x330 [<000000003abaf0b1>] __dev_open+0x175/0x260 [<00000000f94f0387>] __dev_change_flags+0x2fd/0x390 [<00000000f270356a>] rtnl_configure_link+0x64/0x130 [<00000000f2a0eaca>] __rtnl_newlink+0xa84/0xd80 [<000000003bd65dfb>] rtnl_newlink+0x49/0x70 [<000000006e718de1>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000251586d5>] netlink_rcv_skb+0x87/0x1d0 [<000000000b775e59>] netlink_unicast+0x392/0x4c0 [<00000000800b352a>] netlink_sendmsg+0x368/0x6a0 [<00000000d79b2786>] sock_sendmsg+0x56/0x80 [<000000003f5603e8>] ____sys_sendmsg+0x36c/0x390 [<00000000d84cac39>] ___sys_sendmsg+0x8b/0xd0 [<00000000edbd4b97>] __sys_sendmsg+0x88/0x100