[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.78' (ECDSA) to the list of known hosts. 2021/02/17 22:22:05 parsed 1 programs 2021/02/17 22:22:12 executed programs: 0 syzkaller login: [ 424.952687][ T8421] IPVS: ftp: loaded support on port[0] = 21 [ 425.002542][ T8421] chnl_net:caif_netlink_parms(): no params data found [ 425.022494][ T8421] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.030047][ T8421] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.039421][ T8421] device bridge_slave_0 entered promiscuous mode [ 425.047415][ T8421] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.054739][ T8421] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.062516][ T8421] device bridge_slave_1 entered promiscuous mode [ 425.073705][ T8421] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 425.084034][ T8421] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 425.097989][ T8421] team0: Port device team_slave_0 added [ 425.104806][ T8421] team0: Port device team_slave_1 added [ 425.115134][ T8421] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 425.122085][ T8421] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 425.148010][ T8421] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 425.159680][ T8421] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 425.166783][ T8421] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 425.192837][ T8421] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 425.208209][ T8421] device hsr_slave_0 entered promiscuous mode [ 425.214511][ T8421] device hsr_slave_1 entered promiscuous mode [ 425.243447][ T8421] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 425.251238][ T8421] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 425.259372][ T8421] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 425.267008][ T8421] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 425.278799][ T8421] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.285840][ T8421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.293083][ T8421] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.300091][ T8421] bridge0: port 1(bridge_slave_0) entered forwarding state [ 425.319247][ T8421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 425.328625][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 425.336598][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.344521][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.351928][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 425.360981][ T8421] 8021q: adding VLAN 0 to HW filter on device team0 [ 425.369605][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 425.377827][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.384903][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 425.394036][ T3808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 425.402196][ T3808] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.409391][ T3808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.424310][ T8421] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 425.434745][ T8421] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 425.446339][ T3808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 425.455095][ T3808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 425.463347][ T3808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 425.471491][ T3808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 425.479996][ T3808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 425.487507][ T3808] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 425.498615][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 425.506198][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 425.515956][ T8421] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 425.532072][ T8421] device veth0_vlan entered promiscuous mode [ 425.538522][ T8643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 425.547280][ T8643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 425.555940][ T8643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 425.563651][ T8643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 425.573740][ T8421] device veth1_vlan entered promiscuous mode [ 425.585861][ T3808] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 425.593938][ T3808] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 425.601680][ T3808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 425.611510][ T8421] device veth0_macvtap entered promiscuous mode [ 425.619634][ T8421] device veth1_macvtap entered promiscuous mode [ 425.631205][ T8421] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 425.638571][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 425.647618][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 425.656885][ T8421] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 425.664412][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 425.674720][ T8421] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.683516][ T8421] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.692197][ T8421] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.701645][ T8421] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.733379][ T27] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 425.741204][ T27] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 425.753574][ T8546] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 425.754314][ T8643] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 425.761393][ T8546] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 425.777125][ T8643] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 425.796708][ T8665] device vlan2 entered promiscuous mode [ 425.835076][ T8665] device vlan2 entered promiscuous mode [ 427.003260][ T19] Bluetooth: hci0: command 0x0409 tx timeout [ 429.082839][ T19] Bluetooth: hci0: command 0x041b tx timeout [ 431.162876][ T19] Bluetooth: hci0: command 0x040f tx timeout 2021/02/17 22:22:19 executed programs: 1 [ 431.311653][ T8682] device vlan2 entered promiscuous mode [ 431.375459][ T8682] device vlan2 entered promiscuous mode [ 431.432066][ T8693] device vlan2 entered promiscuous mode [ 431.474716][ T8700] device vlan2 entered promiscuous mode [ 433.242674][ T19] Bluetooth: hci0: command 0x0419 tx timeout 2021/02/17 22:22:25 executed programs: 3 [ 436.769904][ T8709] device vlan2 entered promiscuous mode [ 436.814339][ T8714] device vlan2 entered promiscuous mode [ 436.861949][ T8720] device vlan2 entered promiscuous mode [ 436.896507][ T8720] device vlan2 entered promiscuous mode [ 438.442827][ T3297] ieee802154 phy0 wpan0: encryption failed: -22 [ 438.449315][ T3297] ieee802154 phy1 wpan1: encryption failed: -22 2021/02/17 22:22:30 executed programs: 5 [ 442.212556][ T8736] device vlan2 entered promiscuous mode [ 442.254497][ T8741] device vlan2 entered promiscuous mode [ 442.291278][ T8747] device vlan2 entered promiscuous mode [ 442.326917][ T8747] device vlan2 entered promiscuous mode 2021/02/17 22:22:36 executed programs: 7 [ 447.535480][ T8763] device vlan2 entered promiscuous mode [ 447.573954][ T8763] device vlan2 entered promiscuous mode [ 447.621246][ T8774] device vlan2 entered promiscuous mode [ 447.663753][ T8774] device vlan2 entered promiscuous mode 2021/02/17 22:22:41 executed programs: 9 [ 452.969075][ T8790] device vlan2 entered promiscuous mode [ 453.013652][ T8795] device vlan2 entered promiscuous mode [ 453.061343][ T8801] device vlan2 entered promiscuous mode [ 453.103889][ T8808] device vlan2 entered promiscuous mode 2021/02/17 22:22:46 executed programs: 11 [ 458.315866][ T8817] device vlan2 entered promiscuous mode [ 458.363548][ T8817] device vlan2 entered promiscuous mode [ 458.411029][ T8828] device vlan2 entered promiscuous mode [ 458.453491][ T8835] device vlan2 entered promiscuous mode 2021/02/17 22:22:52 executed programs: 13 [ 463.657069][ T8845] device vlan2 entered promiscuous mode [ 463.724391][ T8845] device vlan2 entered promiscuous mode [ 463.771444][ T8856] device vlan2 entered promiscuous mode [ 463.813372][ T8863] device vlan2 entered promiscuous mode 2021/02/17 22:22:57 executed programs: 15 [ 469.058163][ T8872] device vlan2 entered promiscuous mode [ 469.102439][ T8877] device vlan2 entered promiscuous mode [ 469.181986][ T8883] device vlan2 entered promiscuous mode [ 469.216147][ T8883] device vlan2 entered promiscuous mode 2021/02/17 22:23:03 executed programs: 17 [ 474.540615][ T8899] device vlan2 entered promiscuous mode [ 474.571887][ T8904] device vlan2 entered promiscuous mode [ 474.609690][ T8910] device vlan2 entered promiscuous mode [ 474.644667][ T8910] device vlan2 entered promiscuous mode 2021/02/17 22:23:08 executed programs: 19 [ 479.908779][ T8926] device vlan2 entered promiscuous mode [ 479.962009][ T8926] device vlan2 entered promiscuous mode [ 480.028966][ T8937] device vlan2 entered promiscuous mode [ 480.063415][ T8937] device vlan2 entered promiscuous mode 2021/02/17 22:23:13 executed programs: 21 [ 485.291332][ T8953] device vlan2 entered promiscuous mode [ 485.350654][ T8953] device vlan2 entered promiscuous mode [ 485.399054][ T8964] device vlan2 entered promiscuous mode [ 485.440430][ T8964] device vlan2 entered promiscuous mode 2021/02/17 22:23:19 executed programs: 23 [ 490.666698][ T8980] device vlan2 entered promiscuous mode [ 490.709761][ T8985] device vlan2 entered promiscuous mode [ 490.758193][ T8991] device vlan2 entered promiscuous mode [ 490.810683][ T8998] device vlan2 entered promiscuous mode 2021/02/17 22:23:24 executed programs: 25 [ 496.087141][ T9007] device vlan2 entered promiscuous mode [ 496.159616][ T9012] device vlan2 entered promiscuous mode [ 496.237431][ T9019] device vlan2 entered promiscuous mode [ 496.272101][ T9019] device vlan2 entered promiscuous mode [ 499.877235][ T3297] ieee802154 phy0 wpan0: encryption failed: -22 [ 499.883559][ T3297] ieee802154 phy1 wpan1: encryption failed: -22 2021/02/17 22:23:30 executed programs: 27 [ 501.566741][ T9035] device vlan2 entered promiscuous mode [ 501.598798][ T9040] device vlan2 entered promiscuous mode [ 501.657614][ T9046] device vlan2 entered promiscuous mode [ 501.698754][ T9046] device vlan2 entered promiscuous mode 2021/02/17 22:23:35 executed programs: 29 [ 507.002652][ T9063] device vlan2 entered promiscuous mode [ 507.058453][ T9063] device vlan2 entered promiscuous mode [ 507.117194][ T9074] device vlan2 entered promiscuous mode [ 507.158363][ T9074] device vlan2 entered promiscuous mode 2021/02/17 22:23:41 executed programs: 31 [ 512.435659][ T9090] device vlan2 entered promiscuous mode [ 512.477412][ T9090] device vlan2 entered promiscuous mode [ 512.482965][ T9090] device syz_tun entered promiscuous mode [ 512.489282][ T9090] device syz_tun left promiscuous mode [ 512.545752][ T9101] device vlan2 entered promiscuous mode [ 512.587220][ T9101] device vlan2 entered promiscuous mode 2021/02/17 22:23:46 executed programs: 33 [ 517.801432][ T9117] device vlan2 entered promiscuous mode [ 517.846577][ T9122] device vlan2 entered promiscuous mode [ 517.886626][ T9128] device vlan2 entered promiscuous mode [ 517.926651][ T9128] device vlan2 entered promiscuous mode [ 519.004301][ T9140] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888115edca80 (size 64): comm "syz-executor.0", pid 9090, jiffies 4294988524 (age 12.740s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 02 00 00 ................ backtrace: [<00000000946baf05>] mrp_request_join+0x153/0x260 [<000000008c1f8348>] vlan_mvrp_request_join+0x96/0xa0 [<00000000eb1ac4c1>] vlan_dev_open+0x1e7/0x330 [<0000000024e55dc9>] __dev_open+0x175/0x260 [<0000000026b11d5f>] __dev_change_flags+0x2fd/0x390 [<000000003ed18edc>] rtnl_configure_link+0x64/0x130 [<00000000b275ed72>] __rtnl_newlink+0xa84/0xd80 [<0000000017b18935>] rtnl_newlink+0x49/0x70 [<00000000064c74f1>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000670bebab>] netlink_rcv_skb+0x87/0x1d0 [<0000000046e8d6cd>] netlink_unicast+0x392/0x4c0 [<000000006f38c300>] netlink_sendmsg+0x368/0x6a0 [<000000009e50d191>] sock_sendmsg+0x56/0x80 [<0000000091a64824>] ____sys_sendmsg+0x36c/0x390 [<00000000bdbdea67>] ___sys_sendmsg+0x8b/0xd0 [<0000000015db062d>] __sys_sendmsg+0x88/0x100