[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.0' (ECDSA) to the list of known hosts. 2021/01/12 23:18:55 parsed 1 programs 2021/01/12 23:19:02 executed programs: 0 syzkaller login: [ 422.497374][ T8474] IPVS: ftp: loaded support on port[0] = 21 [ 422.562803][ T8474] chnl_net:caif_netlink_parms(): no params data found [ 422.583563][ T8474] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.590698][ T8474] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.597952][ T8474] device bridge_slave_0 entered promiscuous mode [ 422.605138][ T8474] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.612424][ T8474] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.619911][ T8474] device bridge_slave_1 entered promiscuous mode [ 422.630516][ T8474] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 422.640244][ T8474] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 422.653120][ T8474] team0: Port device team_slave_0 added [ 422.659651][ T8474] team0: Port device team_slave_1 added [ 422.669566][ T8474] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 422.676489][ T8474] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.702428][ T8474] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 422.713445][ T8474] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 422.720400][ T8474] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.746289][ T8474] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 422.761932][ T8474] device hsr_slave_0 entered promiscuous mode [ 422.768173][ T8474] device hsr_slave_1 entered promiscuous mode [ 422.797774][ T8474] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 422.805251][ T8474] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 422.813071][ T8474] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 422.820798][ T8474] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 422.832438][ T8474] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.839476][ T8474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.846689][ T8474] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.853721][ T8474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.873079][ T8474] 8021q: adding VLAN 0 to HW filter on device bond0 [ 422.882004][ T8153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 422.890299][ T8153] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.897482][ T8153] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.905126][ T8153] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 422.914134][ T8474] 8021q: adding VLAN 0 to HW filter on device team0 [ 422.922393][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 422.930713][ T8452] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.937725][ T8452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.946537][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 422.955060][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.962116][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.977355][ T8474] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 422.987819][ T8474] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 422.999047][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 423.007213][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 423.015853][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 423.023869][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 423.031937][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 423.039291][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 423.052494][ T8474] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 423.059472][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 423.066889][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 423.078647][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 423.091284][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.099279][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 423.106646][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 423.115204][ T8474] device veth0_vlan entered promiscuous mode [ 423.123557][ T8474] device veth1_vlan entered promiscuous mode [ 423.135220][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 423.143377][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 423.151368][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 423.161057][ T8474] device veth0_macvtap entered promiscuous mode [ 423.168556][ T8474] device veth1_macvtap entered promiscuous mode [ 423.179138][ T8474] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 423.186363][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 423.195526][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 423.204802][ T8474] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 423.212141][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 423.221455][ T8474] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.230587][ T8474] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.239318][ T8474] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.247996][ T8474] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.275117][ T3315] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 423.289373][ T3315] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 423.296771][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 423.305379][ T8694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 423.313363][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 423.321298][ T8694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 423.339229][ T8719] device vlan2 entered promiscuous mode [ 424.558761][ T8694] Bluetooth: hci0: command 0x0409 tx timeout [ 426.638426][ T8694] Bluetooth: hci0: command 0x041b tx timeout 2021/01/12 23:19:09 executed programs: 1 [ 428.570692][ T8732] device vlan2 entered promiscuous mode [ 428.629367][ T8739] device vlan2 entered promiscuous mode [ 428.718531][ T8694] Bluetooth: hci0: command 0x040f tx timeout [ 430.798419][ T8153] Bluetooth: hci0: command 0x0419 tx timeout 2021/01/12 23:19:16 executed programs: 3 [ 434.765929][ T8749] device vlan2 entered promiscuous mode [ 434.810239][ T8754] device vlan2 entered promiscuous mode [ 434.847404][ T8760] device vlan2 entered promiscuous mode [ 434.901050][ T8760] device vlan2 entered promiscuous mode 2021/01/12 23:19:21 executed programs: 5 [ 440.119783][ T8776] device vlan2 entered promiscuous mode [ 440.190489][ T8776] device vlan2 entered promiscuous mode [ 440.239320][ T8787] device vlan2 entered promiscuous mode [ 440.290876][ T8794] device vlan2 entered promiscuous mode 2021/01/12 23:19:27 executed programs: 7 [ 446.405881][ T8804] device vlan2 entered promiscuous mode [ 446.450257][ T8809] device vlan2 entered promiscuous mode [ 446.498884][ T8815] device vlan2 entered promiscuous mode [ 446.540296][ T8815] device vlan2 entered promiscuous mode 2021/01/12 23:19:33 executed programs: 9 [ 452.665429][ T8831] device vlan2 entered promiscuous mode [ 452.709565][ T8838] device vlan2 entered promiscuous mode 2021/01/12 23:19:40 executed programs: 11 [ 458.849226][ T8849] device vlan2 entered promiscuous mode [ 458.890512][ T8854] device vlan2 entered promiscuous mode [ 458.938304][ T8860] device vlan2 entered promiscuous mode 2021/01/12 23:19:46 executed programs: 13 [ 465.074048][ T8872] device vlan2 entered promiscuous mode [ 465.120335][ T8872] device vlan2 entered promiscuous mode [ 465.125876][ T8872] device syz_tun entered promiscuous mode [ 465.132001][ T8872] device syz_tun left promiscuous mode [ 465.178237][ T8883] device vlan2 entered promiscuous mode [ 471.173217][ T8891] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881162b4740 (size 64): comm "syz-executor.0", pid 8872, jiffies 4294983784 (age 8.190s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 02 00 00 ................ backtrace: [<0000000019ee600c>] mrp_request_join+0x153/0x260 [<000000002a293437>] vlan_mvrp_request_join+0x96/0xa0 [<0000000009407528>] vlan_dev_open+0x1e7/0x330 [<00000000851fbd2f>] __dev_open+0x175/0x260 [<00000000710581e2>] __dev_change_flags+0x2fd/0x390 [<0000000061f1d6b5>] rtnl_configure_link+0x64/0x130 [<00000000baa98e7f>] __rtnl_newlink+0xa7e/0xdc0 [<00000000481460d7>] rtnl_newlink+0x49/0x70 [<00000000e682a53f>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000110b7b1b>] netlink_rcv_skb+0x87/0x1d0 [<000000001ea59c69>] netlink_unicast+0x392/0x4c0 [<00000000e38d8443>] netlink_sendmsg+0x368/0x6a0 [<00000000d26619f8>] sock_sendmsg+0x56/0x80 [<00000000ae610d30>] ____sys_sendmsg+0x36c/0x390 [<00000000a179695f>] ___sys_sendmsg+0x8b/0xd0 [<0000000063111d70>] __sys_sendmsg+0x88/0x100