Warning: Permanently added '10.128.0.182' (ECDSA) to the list of known hosts. syzkaller login: [ 55.972690][ T8435] chnl_net:caif_netlink_parms(): no params data found [ 55.990358][ T8435] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.997420][ T8435] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.004777][ T8435] device bridge_slave_0 entered promiscuous mode [ 56.012145][ T8435] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.019254][ T8435] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.026569][ T8435] device bridge_slave_1 entered promiscuous mode [ 56.036971][ T8435] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.046944][ T8435] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.060748][ T8435] team0: Port device team_slave_0 added [ 56.066905][ T8435] team0: Port device team_slave_1 added [ 56.075934][ T8435] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 56.083269][ T8435] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 56.109856][ T8435] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 56.120964][ T8435] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 56.128042][ T8435] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 56.154581][ T8435] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 56.169803][ T8435] device hsr_slave_0 entered promiscuous mode [ 56.176278][ T8435] device hsr_slave_1 entered promiscuous mode [ 56.204958][ T8435] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 56.213180][ T8435] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 56.224579][ T8435] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 56.232536][ T8435] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 56.243768][ T8435] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.251629][ T8435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.259009][ T8435] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.266046][ T8435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.283974][ T8435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.292910][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.301033][ T35] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.308880][ T35] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.316325][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 56.325909][ T8435] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.334780][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.343424][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.350675][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.359547][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.368417][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.375433][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.389824][ T8435] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 56.400519][ T8435] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 56.412664][ T8641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.421166][ T8641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.429550][ T8641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.437612][ T8641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.445613][ T8641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.453066][ T8641] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.464219][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 56.471749][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 56.481557][ T8435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.492884][ T8641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.505565][ T8435] device veth0_vlan entered promiscuous mode [ 56.511939][ T4847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.519958][ T4847] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.528198][ T4847] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.537862][ T8435] device veth1_vlan entered promiscuous mode [ 56.549553][ T4847] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 56.557367][ T4847] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 56.565226][ T4847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 56.574427][ T8435] device veth0_macvtap entered promiscuous mode [ 56.582039][ T8435] device veth1_macvtap entered promiscuous mode [ 56.592522][ T8435] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.600728][ T8641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.609366][ T8641] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 56.618520][ T8435] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.625877][ T4847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 56.635449][ T8435] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.644375][ T8435] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.653434][ T8435] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.662346][ T8435] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 63.331403][ T8435] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 69.631909][ T8435] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881140ffc00 (size 1024): comm "syz-executor060", pid 8644, jiffies 4294942938 (age 13.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1d 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............ backtrace: [] sk_prot_alloc+0xd2/0x1b0 [] sk_alloc+0x30/0x3f0 [] can_create+0x108/0x300 [] __sock_create+0x1ab/0x2b0 [] __sys_socket+0x6f/0x140 [] __x64_sys_socket+0x1a/0x20 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881170d2340 (size 32): comm "syz-executor060", pid 8644, jiffies 4294942938 (age 13.010s) hex dump (first 32 bytes): b0 02 05 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] apparmor_sk_alloc_security+0x53/0xd0 [] security_sk_alloc+0x31/0x70 [] sk_prot_alloc+0xed/0x1b0 [] sk_alloc+0x30/0x3f0 [] can_create+0x108/0x300 [] __sock_create+0x1ab/0x2b0 [] __sys_socket+0x6f/0x140 [] __x64_sys_socket+0x1a/0x20 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88811344a100 (size 232): comm "syz-executor060", pid 8644, jiffies 4294942938 (age 13.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 2c 10 81 88 ff ff 00 fc 0f 14 81 88 ff ff ..,............. backtrace: [] __alloc_skb+0x20f/0x280 [] alloc_skb_with_frags+0x6a/0x2b0 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2cf/0x800 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0x8b/0xd0 [] __sys_sendmsg+0x88/0x100 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88811344aa00 (size 232): comm "syz-executor060", pid 8644, jiffies 4294942938 (age 13.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 2c 10 81 88 ff ff 00 fc 0f 14 81 88 ff ff ..,............. backtrace: [] __alloc_skb+0x20f/0x280 [] alloc_skb_with_frags+0x6a/0x2b0 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2cf/0x800 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0x8b/0xd0 [] __sys_sendmsg+0x88/0x100 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae