[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.8' (ECDSA) to the list of known hosts. syzkaller login: [ 50.307631][ T8406] IPVS: ftp: loaded support on port[0] = 21 [ 50.336368][ T8406] chnl_net:caif_netlink_parms(): no params data found [ 50.355920][ T8406] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.363296][ T8406] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.371965][ T8406] device bridge_slave_0 entered promiscuous mode [ 50.379859][ T8406] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.387533][ T8406] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.395016][ T8406] device bridge_slave_1 entered promiscuous mode [ 50.406857][ T8406] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.416995][ T8406] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.430469][ T8406] team0: Port device team_slave_0 added [ 50.437498][ T8406] team0: Port device team_slave_1 added [ 50.447153][ T8406] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 50.454266][ T8406] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.480686][ T8406] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 50.491882][ T8406] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 50.499012][ T8406] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.530773][ T8406] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 50.547080][ T8406] device hsr_slave_0 entered promiscuous mode [ 50.553771][ T8406] device hsr_slave_1 entered promiscuous mode [ 50.584668][ T8406] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 50.592892][ T8406] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 50.604713][ T8406] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 50.614344][ T8406] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 50.627011][ T8406] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.634062][ T8406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.641358][ T8406] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.648417][ T8406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.668464][ T8406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.678259][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.686681][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.693921][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.701737][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.710666][ T8406] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.719000][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.727610][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.734733][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.751988][ T8406] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 50.762378][ T8406] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 50.773898][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.782553][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.791990][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.800405][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.808751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.817001][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.825076][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.833562][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.841032][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.852476][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 50.860103][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 50.869764][ T8406] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 50.881911][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.895101][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.903389][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.912015][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.920716][ T8406] device veth0_vlan entered promiscuous mode [ 50.929565][ T8406] device veth1_vlan entered promiscuous mode [ 50.941508][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 50.949486][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 50.957850][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.967331][ T8406] device veth0_macvtap entered promiscuous mode [ 50.975474][ T8406] device veth1_macvtap entered promiscuous mode [ 50.986238][ T8406] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 50.993475][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.002482][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 51.016311][ T8406] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 51.024686][ T8406] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 51.033718][ T8406] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.042535][ T8406] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.051294][ T8406] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.061930][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.080476][ T8614] device vxcan1 entered promiscuous mode [ 51.086434][ T8614] device vlan2 entered promiscuous mode [ 51.092079][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready [ 51.100315][ T8614] device vxcan1 left promiscuous mode executing program [ 56.306529][ T8619] device vxcan1 entered promiscuous mode [ 56.312339][ T8619] device vlan2 entered promiscuous mode [ 56.318212][ T8619] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready [ 56.325823][ T8619] device vxcan1 left promiscuous mode [ 57.394273][ T8406] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 63.551731][ T8406] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888113af3540 (size 64): comm "syz-executor884", pid 8614, jiffies 4294942348 (age 12.530s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 00 ................ backtrace: [<000000002d5ab455>] garp_request_join+0x138/0x220 [<00000000e2735066>] vlan_gvrp_request_join+0x96/0xa0 [<000000000a09bcba>] vlan_dev_open+0x1f9/0x330 [<0000000099a06106>] __dev_open+0x175/0x260 [<00000000c64771bc>] __dev_change_flags+0x2fd/0x390 [<0000000033c60308>] rtnl_configure_link+0x64/0x130 [<00000000d2dc35d7>] __rtnl_newlink+0xa84/0xd80 [<000000002d1c2985>] rtnl_newlink+0x49/0x70 [<00000000953814b0>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000b0a02c91>] netlink_rcv_skb+0x87/0x1d0 [<0000000076a7c682>] netlink_unicast+0x392/0x4c0 [<00000000e1ef201b>] netlink_sendmsg+0x368/0x6a0 [<0000000042f5d8f5>] sock_sendmsg+0x56/0x80 [<0000000081120da6>] ____sys_sendmsg+0x36c/0x390 [<0000000028de48ab>] ___sys_sendmsg+0x8b/0xd0 [<00000000ce9c3e99>] __sys_sendmsg+0x88/0x100 BUG: memory leak unreferenced object 0xffff888113af3500 (size 64): comm "syz-executor884", pid 8614, jiffies 4294942348 (age 12.530s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 02 00 00 ................ backtrace: [<00000000effd6759>] mrp_request_join+0x153/0x260 [<0000000088f0ecdd>] vlan_mvrp_request_join+0x96/0xa0 [<0000000028839445>] vlan_dev_open+0x1e7/0x330 [<0000000099a06106>] __dev_open+0x175/0x260 [<00000000c64771bc>] __dev_change_flags+0x2fd/0x390 [<0000000033c60308>] rtnl_configure_link+0x64/0x130 [<00000000d2dc35d7>] __rtnl_newlink+0xa84/0xd80 [<000000002d1c2985>] rtnl_newlink+0x49/0x70 [<00000000953814b0>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000b0a02c91>] netlink_rcv_skb+0x87/0x1d0 [<0000000076a7c682>] netlink_unicast+0x392/0x4c0 [<00000000e1ef201b>] netlink_sendmsg+0x368/0x6a0 [<0000000042f5d8f5>] sock_sendmsg+0x56/0x80 [<0000000081120da6>] ____sys_sendmsg+0x36c/0x390 [<0000000028de48ab>] ___sys_sendmsg+0x8b/0xd0 [<00000000ce9c3e99>] __sys_sendmsg+0x88/0x100 BUG: memory leak unreferenced object 0xffff888113a94900 (size 64): comm "syz-executor884", pid 8619, jiffies 4294942870 (age 7.310s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 00 ................ backtrace: [<000000002d5ab455>] garp_request_join+0x138/0x220 [<00000000e2735066>] vlan_gvrp_request_join+0x96/0xa0 [<000000000a09bcba>] vlan_dev_open+0x1f9/0x330 [<0000000099a06106>] __dev_open+0x175/0x260 [<00000000c64771bc>] __dev_change_flags+0x2fd/0x390 [<0000000033c60308>] rtnl_configure_link+0x64/0x130 [<00000000d2dc35d7>] __rtnl_newlink+0xa84/0xd80 [<000000002d1c2985>] rtnl_newlink+0x49/0x70 [<00000000953814b0>] rtnetlink_rcv_msg+0x1fc/0x520 [<00000000b0a02c91>] netlink_rcv_skb+0x87/0x1d0 [<0000000076a7c682>] netlink_unicast+0x392/0x4c0 [<00000000e1ef201b>] netlink_sendmsg+0x368/0x6a0 [<0000000042f5d8f5>] sock_sendmsg+0x56/0x80 [<0000000081120da6>] ____sys_sendmsg+0x36c/0x390 [<0000000028de48ab>] ___sys_sendmsg+0x8b/0xd0 [<00000000ce9c3e99>] __sys_sendmsg+0x88/0x100