[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.15.201' (ECDSA) to the list of known hosts. syzkaller login: [ 55.301182][ T6514] chnl_net:caif_netlink_parms(): no params data found [ 55.321926][ T6514] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.329278][ T6514] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.336966][ T6514] device bridge_slave_0 entered promiscuous mode [ 55.343872][ T6514] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.350878][ T6514] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.358325][ T6514] device bridge_slave_1 entered promiscuous mode [ 55.369699][ T6514] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.379455][ T6514] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.393150][ T6514] team0: Port device team_slave_0 added [ 55.399091][ T6514] team0: Port device team_slave_1 added [ 55.409455][ T6514] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 55.416452][ T6514] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 55.442354][ T6514] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 55.453296][ T6514] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 55.460204][ T6514] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 55.486499][ T6514] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 55.503321][ T6514] device hsr_slave_0 entered promiscuous mode [ 55.509474][ T6514] device hsr_slave_1 entered promiscuous mode [ 55.540848][ T6514] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 55.548346][ T6514] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 55.555961][ T6514] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 55.563300][ T6514] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 55.574386][ T6514] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.581385][ T6514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.588601][ T6514] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.595629][ T6514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.614601][ T6514] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.623283][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.630947][ T1910] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.638398][ T1910] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.646240][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 55.654696][ T6514] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.662659][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.670728][ T1910] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.677756][ T1910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.692224][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.700335][ T1910] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.707357][ T1910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.715124][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.723275][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.731257][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.739141][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.747134][ T6833] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.755521][ T6514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.765978][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 55.773295][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 55.782406][ T6514] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.797347][ T6514] device veth0_vlan entered promiscuous mode [ 55.803556][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.811777][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.819850][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.827227][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.836174][ T6514] device veth1_vlan entered promiscuous mode [ 55.847578][ T6514] device veth0_macvtap entered promiscuous mode [ 55.854090][ T6833] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 55.861709][ T6833] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 55.869462][ T6833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.877675][ T6833] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 55.886297][ T6514] device veth1_macvtap entered promiscuous mode [ 55.896015][ T6514] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.903364][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready executing program [ 55.913152][ T6514] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 55.920380][ T6833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.929469][ T6514] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.938268][ T6514] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.947055][ T6514] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.956618][ T6514] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.923791][ C0] vcan0: j1939_tp_rxtimer: 0xffff888117972200: rx timeout, send abort [ 56.931979][ C0] vcan0: j1939_tp_rxtimer: 0xffff88811794ae00: rx timeout, send abort [ 56.940147][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff888117972200: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 56.954374][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff88811794ae00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 62.072962][ T6514] kmemleak: 54 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881119ddd00 (size 232): comm "syz-executor637", pid 6835, jiffies 4294942875 (age 8.290s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 51 14 81 88 ff ff 00 d0 61 17 81 88 ff ff ..Q.......a..... backtrace: [] __alloc_skb+0x20f/0x280 [] alloc_skb_with_frags+0x6a/0x2b0 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2cf/0x800 [] sock_sendmsg+0x56/0x80 [] sock_no_sendpage+0x8f/0xc0 [] kernel_sendpage.part.0+0xa3/0x140 [] sock_sendpage+0x5b/0x90 [] pipe_to_sendpage+0xa2/0x110 [] __splice_from_pipe+0x1e2/0x330 [] generic_splice_sendpage+0x6f/0xa0 [] direct_splice_actor+0x4b/0x70 [] splice_direct_to_actor+0x153/0x350 [] do_splice_direct+0xe8/0x150 [] do_sendfile+0x587/0x7e0 [] __x64_sys_sendfile64+0xe2/0x100 BUG: memory leak unreferenced object 0xffff8881119ddc00 (size 232): comm "syz-executor637", pid 6835, jiffies 4294942875 (age 8.290s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 51 14 81 88 ff ff 00 d0 61 17 81 88 ff ff ..Q.......a..... backtrace: [] __alloc_skb+0x20f/0x280 [] alloc_skb_with_frags+0x6a/0x2b0 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2cf/0x800 [] sock_sendmsg+0x56/0x80 [] sock_no_sendpage+0x8f/0xc0 [] kernel_sendpage.part.0+0xa3/0x140 [] sock_sendpage+0x5b/0x90 [] pipe_to_sendpage+0xa2/0x110 [] __splice_from_pipe+0x1e2/0x330 [] generic_splice_sendpage+0x6f/0xa0 [] direct_splice_actor+0x4b/0x70 [] splice_direct_to_actor+0x153/0x350 [] do_splice_direct+0xe8/0x150 [] do_sendfile+0x587/0x7e0 [] __x64_sys_sendfile64+0xe2/0x100 BUG: memory leak unreferenced object 0xffff88811777d400 (size 1024): comm "syz-executor637", pid 6835, jiffies 4294942875 (age 8.290s) hex dump (first 32 bytes): 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0xdf/0x280 [] alloc_skb_with_frags+0x6a/0x2b0 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2cf/0x800 [] sock_sendmsg+0x56/0x80 [] sock_no_sendpage+0x8f/0xc0 [] kernel_sendpage.part.0+0xa3/0x140 [] sock_sendpage+0x5b/0x90 [] pipe_to_sendpage+0xa2/0x110 [] __splice_from_pipe+0x1e2/0x330 [] generic_splice_sendpage+0x6f/0xa0 [] direct_splice_actor+0x4b/0x70 [] splice_direct_to_actor+0x153/0x350 [] do_splice_direct+0xe8/0x150 [] do_sendfile+0x587/0x7e0 [] __x64_sys_sendfile64+0xe2/0x100 [ 64.210335][ T6514] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak)