Warning: Permanently added '10.128.0.190' (ECDSA) to the list of known hosts. syzkaller login: [ 64.285189][ T3598] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 64.330520][ T3599] chnl_net:caif_netlink_parms(): no params data found [ 64.347573][ T3599] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.354637][ T3599] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.361879][ T3599] device bridge_slave_0 entered promiscuous mode [ 64.368841][ T3599] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.375939][ T3599] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.383167][ T3599] device bridge_slave_1 entered promiscuous mode [ 64.393649][ T3599] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.403321][ T3599] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.416081][ T3599] team0: Port device team_slave_0 added [ 64.422146][ T3599] team0: Port device team_slave_1 added [ 64.431190][ T3599] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.438141][ T3599] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.464138][ T3599] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.475203][ T3599] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.482126][ T3599] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.508279][ T3599] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.523392][ T3599] device hsr_slave_0 entered promiscuous mode [ 64.529762][ T3599] device hsr_slave_1 entered promiscuous mode [ 64.556155][ T3599] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 64.563588][ T3599] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 64.571020][ T3599] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 64.578405][ T3599] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 64.588957][ T3599] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.595991][ T3599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.603214][ T3599] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.610244][ T3599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.627611][ T3599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.635790][ T3261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.643460][ T3261] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.651164][ T3261] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.658629][ T3261] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 64.667155][ T3599] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.675073][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.683194][ T2512] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.690228][ T2512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.703931][ T3599] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 64.714318][ T3599] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.725581][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.733803][ T2512] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.740816][ T2512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.748604][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.756723][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.764819][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.772757][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.781340][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.788679][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.799538][ T3599] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.806839][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 64.814172][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 64.847841][ T3599] device veth0_vlan entered promiscuous mode [ 64.854316][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 64.862641][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.870879][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.878398][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.887182][ T3599] device veth1_vlan entered promiscuous mode [ 64.897063][ T3599] device veth0_macvtap entered promiscuous mode [ 64.903733][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 64.911418][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 64.919183][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 64.927402][ T2512] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 64.935800][ T3599] device veth1_macvtap entered promiscuous mode [ 64.945258][ T3599] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 64.952452][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 64.961883][ T3599] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 64.969848][ T3599] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.978562][ T3599] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.987314][ T3599] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 64.996086][ T3599] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.005368][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.270060][ C1] vxcan1: j1939_tp_rxtimer: 0xffff888112812000: rx timeout, send abort [ 66.278386][ C1] vxcan1: j1939_xtp_rx_abort_one: 0xffff888112812000: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 69.873789][ T25] cfg80211: failed to load regulatory.db [ 71.393948][ T3599] kmemleak: 33 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810b5aeb00 (size 240): comm "syz-executor176", pid 3614, jiffies 4294943771 (age 8.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 55 0b 81 88 ff ff 00 60 6f 12 81 88 ff ff ..U......`o..... backtrace: [] __alloc_skb+0x216/0x290 [] alloc_skb_with_frags+0x6a/0x340 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2d2/0x810 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0xa8/0x110 [] __sys_sendmsg+0x88/0x100 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810b5ae100 (size 240): comm "syz-executor176", pid 3614, jiffies 4294943771 (age 8.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 55 0b 81 88 ff ff 00 60 6f 12 81 88 ff ff ..U......`o..... backtrace: [] __alloc_skb+0x216/0x290 [] alloc_skb_with_frags+0x6a/0x340 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2d2/0x810 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0xa8/0x110 [] __sys_sendmsg+0x88/0x100 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810b5aec00 (size 240): comm "syz-executor176", pid 3614, jiffies 4294943771 (age 8.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 55 0b 81 88 ff ff 00 60 6f 12 81 88 ff ff ..U......`o..... backtrace: [] __alloc_skb+0x216/0x290 [] alloc_skb_with_frags+0x6a/0x340 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2d2/0x810 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0xa8/0x110 [] __sys_sendmsg+0x88/0x100 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810b5aed00 (size 240): comm "syz-executor176", pid 3614, jiffies 4294943771 (age 8.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 55 0b 81 88 ff ff 00 60 6f 12 81 88 ff ff ..U......`o..... backtrace: [] __alloc_skb+0x216/0x290 [] alloc_skb_with_frags+0x6a/0x340 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2d2/0x810 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0xa8/0x110 [] __sys_sendmsg+0x88/0x100 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd