Warning: Permanently added '10.128.0.10' (ECDSA) to the list of known hosts. syzkaller login: [ 50.474081][ T8418] chnl_net:caif_netlink_parms(): no params data found [ 50.492876][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.499920][ T8418] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.507377][ T8418] device bridge_slave_0 entered promiscuous mode [ 50.514719][ T8418] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.522266][ T8418] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.529505][ T8418] device bridge_slave_1 entered promiscuous mode [ 50.540149][ T8418] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.550988][ T8418] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.564481][ T8418] team0: Port device team_slave_0 added [ 50.571294][ T8418] team0: Port device team_slave_1 added [ 50.580495][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 50.587462][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.613636][ T8418] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 50.625583][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 50.632541][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.658574][ T8418] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 50.674067][ T8418] device hsr_slave_0 entered promiscuous mode [ 50.680290][ T8418] device hsr_slave_1 entered promiscuous mode [ 50.710373][ T8418] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 50.718400][ T8418] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 50.726492][ T8418] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 50.734191][ T8418] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 50.745767][ T8418] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.753024][ T8418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.760264][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.767298][ T8418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.785469][ T8418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.794417][ T3794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.803179][ T3794] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.810911][ T3794] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.818525][ T3794] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.827448][ T8418] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.835725][ T3206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.844398][ T3206] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.851579][ T3206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.860403][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.868832][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.876034][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.886844][ T3206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.895198][ T3206] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.906998][ T8418] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 50.917841][ T8418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 50.929185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.937515][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.945637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.953760][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.965261][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 50.972895][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 50.981552][ T8418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 50.993329][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.006000][ T8418] device veth0_vlan entered promiscuous mode [ 51.012291][ T4833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.020252][ T4833] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.027693][ T4833] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.037247][ T8418] device veth1_vlan entered promiscuous mode [ 51.049352][ T8418] device veth0_macvtap entered promiscuous mode [ 51.056450][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 51.064364][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 51.072445][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.080501][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 51.089402][ T8418] device veth1_macvtap entered promiscuous mode [ 51.099842][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 51.107270][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.117290][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 51.124773][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 51.134244][ T8418] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.143223][ T8418] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.152054][ T8418] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.160961][ T8418] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.134084][ C1] vcan0: j1939_tp_rxtimer: 0xffff888116ec0600: rx timeout, send abort [ 52.142426][ C1] vcan0: j1939_tp_rxtimer: 0xffff888116ec0400: rx timeout, send abort [ 52.151070][ C1] vcan0: j1939_xtp_rx_abort_one: 0xffff888116ec0600: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 52.165383][ C1] vcan0: j1939_xtp_rx_abort_one: 0xffff888116ec0400: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 57.379980][ T8418] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 59.587550][ T8418] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888112d44400 (size 232): comm "syz-executor006", pid 8628, jiffies 4294942391 (age 8.470s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 d7 0f 81 88 ff ff 00 64 db 16 81 88 ff ff .........d...... backtrace: [] __alloc_skb+0x20f/0x280 [] alloc_skb_with_frags+0x6a/0x2c0 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2e2/0x7d0 [] sock_sendmsg+0x56/0x80 [] sock_no_sendpage+0x8f/0xc0 [] kernel_sendpage.part.0+0xeb/0x150 [] sock_sendpage+0x5b/0x90 [] pipe_to_sendpage+0xa2/0x110 [] __splice_from_pipe+0x1e2/0x330 [] generic_splice_sendpage+0x6f/0xa0 [] direct_splice_actor+0x4b/0x70 [] splice_direct_to_actor+0x153/0x350 [] do_splice_direct+0xe8/0x150 [] do_sendfile+0x51f/0x760 [] __x64_sys_sendfile64+0xe2/0x100 BUG: memory leak unreferenced object 0xffff888116d2d800 (size 1024): comm "syz-executor006", pid 8628, jiffies 4294942391 (age 8.470s) hex dump (first 32 bytes): 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0xdf/0x280 [] alloc_skb_with_frags+0x6a/0x2c0 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2e2/0x7d0 [] sock_sendmsg+0x56/0x80 [] sock_no_sendpage+0x8f/0xc0 [] kernel_sendpage.part.0+0xeb/0x150 [] sock_sendpage+0x5b/0x90 [] pipe_to_sendpage+0xa2/0x110 [] __splice_from_pipe+0x1e2/0x330 [] generic_splice_sendpage+0x6f/0xa0 [] direct_splice_actor+0x4b/0x70 [] splice_direct_to_actor+0x153/0x350 [] do_splice_direct+0xe8/0x150 [] do_sendfile+0x51f/0x760 [] __x64_sys_sendfile64+0xe2/0x100 BUG: memory leak unreferenced object 0xffff888111010d00 (size 232): comm "syz-executor006", pid 8628, jiffies 4294942391 (age 8.470s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 d7 0f 81 88 ff ff 00 64 db 16 81 88 ff ff .........d...... backtrace: [] __alloc_skb+0x20f/0x280 [] alloc_skb_with_frags+0x6a/0x2c0 [] sock_alloc_send_pskb+0x353/0x3c0 [] j1939_sk_sendmsg+0x2e2/0x7d0 [] sock_sendmsg+0x56/0x80 [] sock_no_sendpage+0x8f/0xc0 [] kernel_sendpage.part.0+0xeb/0x150 [] sock_sendpage+0x5b/0x90 [] pipe_to_sendpage+0xa2/0x110 [] __splice_from_pipe+0x1e2/0x330 [] generic_splice_sendpage+0x6f/0xa0 [] direct_splice_actor+0x4b/0x70 [] splice_direct_to_actor+0x153/0x350 [] do_splice_direct+0xe8/0x150 [] do_sendfile+0x51f/0x760 [] __x64_sys_sendfile64+0xe2/0x100