DUID 00:04:05:57:04:5b:ff:82:97:5c:61:7c:7c:5f:d7:06:b7:63 forked to background, child pid 3175 [ 11.532052][ T3176] 8021q: adding VLAN 0 to HW filter on device bond0 [ 11.535227][ T3176] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.22' (ECDSA) to the list of known hosts. syzkaller login: [ 68.360949][ T3590] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 68.406803][ T3591] chnl_net:caif_netlink_parms(): no params data found [ 68.423682][ T3591] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.430772][ T3591] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.438176][ T3591] device bridge_slave_0 entered promiscuous mode [ 68.445019][ T3591] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.452207][ T3591] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.459566][ T3591] device bridge_slave_1 entered promiscuous mode [ 68.469882][ T3591] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.479625][ T3591] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.492138][ T3591] team0: Port device team_slave_0 added [ 68.498269][ T3591] team0: Port device team_slave_1 added [ 68.507069][ T3591] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.514111][ T3591] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.540091][ T3591] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.551127][ T3591] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.558069][ T3591] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.584115][ T3591] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.599526][ T3591] device hsr_slave_0 entered promiscuous mode [ 68.605736][ T3591] device hsr_slave_1 entered promiscuous mode [ 68.632105][ T3591] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.639666][ T3591] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.647017][ T3591] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.654566][ T3591] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.664935][ T3591] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.671997][ T3591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.679220][ T3591] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.686229][ T3591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.703383][ T3591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.711663][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.719406][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.726735][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.734593][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 68.742997][ T3591] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.750908][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.759097][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.766119][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.774520][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.782724][ T3598] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.789744][ T3598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.800494][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.808586][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.819252][ T3591] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 68.829614][ T3591] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.841353][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.849563][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.857478][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.865772][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.877370][ T3591] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.884406][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 68.891732][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.925161][ T3591] device veth0_vlan entered promiscuous mode [ 68.931857][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.940416][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.948367][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.955728][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.964414][ T3591] device veth1_vlan entered promiscuous mode [ 68.973674][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 68.981459][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 68.989297][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.997786][ T3591] device veth0_macvtap entered promiscuous mode [ 69.004964][ T3591] device veth1_macvtap entered promiscuous mode [ 69.013776][ T3591] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 69.021050][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.029502][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 69.038517][ T3591] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 69.045812][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.054708][ T3591] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.063460][ T3591] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 69.072248][ T3591] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.081053][ T3591] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.878140][ T142] cfg80211: failed to load regulatory.db [ 75.248207][ T3591] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810a65c900 (size 240): comm "syz-executor852", pid 3608, jiffies 4294944187 (age 8.140s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 46 0b 81 88 ff ff 00 04 43 0b 81 88 ff ff ..F.......C..... backtrace: [] __alloc_skb+0x216/0x290 [] alloc_skb_with_frags+0x6a/0x340 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2d2/0x810 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0xa8/0x110 [] __sys_sendmsg+0x88/0x100 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810a65c500 (size 240): comm "syz-executor852", pid 3608, jiffies 4294944187 (age 8.140s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 46 0b 81 88 ff ff 00 04 43 0b 81 88 ff ff ..F.......C..... backtrace: [] __alloc_skb+0x216/0x290 [] alloc_skb_with_frags+0x6a/0x340 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2d2/0x810 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0xa8/0x110 [] __sys_sendmsg+0x88/0x100 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810cc95800 (size 2048): comm "syz-executor852", pid 3608, jiffies 4294944187 (age 8.140s) hex dump (first 32 bytes): 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0xe3/0x290 [] alloc_skb_with_frags+0x6a/0x340 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2d2/0x810 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0xa8/0x110 [] __sys_sendmsg+0x88/0x100 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd