[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. [ 22.023362][ C1] random: crng init done [ 22.027627][ C1] random: 7 urandom warning(s) missed due to ratelimiting Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 23.431450][ T8402] sshd (8402) used greatest stack depth: 9992 bytes left Warning: Permanently added '10.128.1.56' (ECDSA) to the list of known hosts. 2020/06/30 19:15:04 fuzzer started 2020/06/30 19:15:04 dialing manager at 10.128.0.105:33235 2020/06/30 19:15:04 syscalls: 3106 2020/06/30 19:15:04 code coverage: enabled 2020/06/30 19:15:04 comparison tracing: enabled 2020/06/30 19:15:04 extra coverage: enabled 2020/06/30 19:15:04 setuid sandbox: enabled 2020/06/30 19:15:04 namespace sandbox: enabled 2020/06/30 19:15:04 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/30 19:15:04 fault injection: enabled 2020/06/30 19:15:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/30 19:15:04 net packet injection: enabled 2020/06/30 19:15:04 net device setup: enabled 2020/06/30 19:15:04 concurrency sanitizer: enabled 2020/06/30 19:15:04 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/30 19:15:04 USB emulation: enabled 2020/06/30 19:15:05 suppressing KCSAN reports in functions: 'find_get_pages_range_tag' '__add_to_page_cache_locked' '__xa_clear_mark' '__ext4_new_inode' 19:15:08 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_int(r0, 0x0, 0xb, 0x0, &(0x7f00000000c0)) [ 34.096929][ T8654] IPVS: ftp: loaded support on port[0] = 21 [ 34.150286][ T8654] chnl_net:caif_netlink_parms(): no params data found [ 34.190447][ T8654] bridge0: port 1(bridge_slave_0) entered blocking state 19:15:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) sendmsg$netlink(r5, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x14}, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x14}, 0x0) [ 34.197798][ T8654] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.205182][ T8654] device bridge_slave_0 entered promiscuous mode [ 34.212880][ T8654] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.220280][ T8654] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.228069][ T8654] device bridge_slave_1 entered promiscuous mode [ 34.246964][ T8654] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.269396][ T8654] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.309773][ T8654] team0: Port device team_slave_0 added [ 34.327608][ T8654] team0: Port device team_slave_1 added [ 34.342274][ T8654] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.349292][ T8654] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.375760][ T8654] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.398140][ T8654] batman_adv: batadv0: Adding interface: batadv_slave_1 19:15:08 executing program 2: r0 = memfd_create(&(0x7f0000000500)='I\x00=c\x99a\x87\xd3\x00\x15bu\x9c\xe7\x1e\xe4\b\x1f\xc0\x99\"2\t\xa0\xaba\x82\xdf\xc5,\x14\xd8c\x9b$\x1b\x13\xb9\xe0W\xe1\x8f\xad\xcd\x9d\xb0U\xf8^\xf2\xddh\x16g\x92}`%\xaf\x02tl\x96\xfc\xf2KJ\xb4\xc1`F\x9f\xa2\xe9\xe6Q\xa5\n\x9f\x02\x1a\x99\x87\xb9\x9b\xb4\xdbAec\x17X\xc9\a\x1d:\x89\x84\xe9#I0_\xbf\xb5\x93{\b\xae\x9a>\xb1U\x93=@k\xb6\xd7R{N\xa2@\xc3\xfc\x85\x9a\xb0\xc9H\x18\xb2\xc8L*\xa0q\x1c^\x86\xdbb\xfb,\"\xa6\xde\x02\xd5\x9e\x9a\x18v\x93\xe0\xf3\xfcU\xaat9\xa5O\xeb}\x81\xa9