Warning: Permanently added '10.128.0.231' (ECDSA) to the list of known hosts. 2022/08/17 11:45:17 ignoring optional flag "sandboxArg"="0" 2022/08/17 11:45:17 parsed 1 programs [ 1110.852789][ T3671] cgroup: Unknown subsys name 'net' [ 1110.959566][ T3671] cgroup: Unknown subsys name 'rlimit' 2022/08/17 11:45:24 executed programs: 0 [ 1118.208108][ T3671] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1119.308495][ T3679] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1119.315547][ T3681] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1119.322584][ T3681] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1119.329800][ T3681] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1119.336906][ T3681] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1119.344025][ T3681] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1119.372671][ T3678] chnl_net:caif_netlink_parms(): no params data found [ 1119.389405][ T3678] bridge0: port 1(bridge_slave_0) entered blocking state [ 1119.396452][ T3678] bridge0: port 1(bridge_slave_0) entered disabled state [ 1119.403753][ T3678] device bridge_slave_0 entered promiscuous mode [ 1119.410670][ T3678] bridge0: port 2(bridge_slave_1) entered blocking state [ 1119.417829][ T3678] bridge0: port 2(bridge_slave_1) entered disabled state [ 1119.425073][ T3678] device bridge_slave_1 entered promiscuous mode [ 1119.435200][ T3678] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1119.445055][ T3678] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1119.458156][ T3678] team0: Port device team_slave_0 added [ 1119.464232][ T3678] team0: Port device team_slave_1 added [ 1119.473182][ T3678] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1119.480150][ T3678] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1119.506108][ T3678] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1119.517063][ T3678] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1119.524059][ T3678] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1119.550046][ T3678] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1119.565026][ T3678] device hsr_slave_0 entered promiscuous mode [ 1119.571322][ T3678] device hsr_slave_1 entered promiscuous mode [ 1119.596249][ T3678] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1119.603554][ T3678] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1119.610964][ T3678] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1119.618401][ T3678] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1119.628754][ T3678] bridge0: port 2(bridge_slave_1) entered blocking state [ 1119.635778][ T3678] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1119.643014][ T3678] bridge0: port 1(bridge_slave_0) entered blocking state [ 1119.650030][ T3678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1119.668372][ T3678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1119.676656][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1119.684788][ T3686] bridge0: port 1(bridge_slave_0) entered disabled state [ 1119.692291][ T3686] bridge0: port 2(bridge_slave_1) entered disabled state [ 1119.699929][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1119.708565][ T3678] 8021q: adding VLAN 0 to HW filter on device team0 [ 1119.718497][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1119.726656][ T140] bridge0: port 1(bridge_slave_0) entered blocking state [ 1119.733692][ T140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1119.741085][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1119.749329][ T140] bridge0: port 2(bridge_slave_1) entered blocking state [ 1119.756340][ T140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1119.765148][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1119.773282][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1119.783827][ T3678] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1119.794233][ T3678] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1119.805315][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1119.813499][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1119.821610][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1119.829588][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1119.840434][ T3678] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1119.847494][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1119.854797][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1119.888000][ T3691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1119.896358][ T3691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1119.904597][ T3691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1119.912040][ T3691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1119.920163][ T3678] device veth0_vlan entered promiscuous mode [ 1119.927486][ T3678] device veth1_vlan entered promiscuous mode [ 1119.936898][ T3691] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1119.944672][ T3691] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1119.952452][ T3691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1119.961252][ T3678] device veth0_macvtap entered promiscuous mode [ 1119.968325][ T3678] device veth1_macvtap entered promiscuous mode [ 1119.977197][ T3678] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1119.984472][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1119.993065][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1120.001732][ T3678] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1120.009072][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1120.017906][ T3678] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1120.026570][ T3678] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1120.035368][ T3678] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1120.044127][ T3678] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1120.063142][ T3687] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1120.072905][ T3687] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1120.080870][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1120.088455][ T26] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1120.096329][ T26] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1120.103702][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1120.119798][ T3700] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 1121.387471][ T3672] Bluetooth: hci0: command 0x0409 tx timeout [ 1123.467425][ T3672] Bluetooth: hci0: command 0x041b tx timeout 2022/08/17 11:45:32 executed programs: 1 [ 1125.557433][ T3672] Bluetooth: hci0: command 0x040f tx timeout [ 1127.627365][ T3691] Bluetooth: hci0: command 0x0419 tx timeout 2022/08/17 11:45:37 executed programs: 3 [ 1136.537708][ T3711] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810e2b0d00 (size 240): comm "syz-executor.0", pid 3678, jiffies 4295049231 (age 19.190s) hex dump (first 32 bytes): a0 9c 88 13 81 88 ff ff a0 9c 88 13 81 88 ff ff ................ 00 80 bb 0f 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] napi_skb_cache_get+0x6b/0x90 [] __alloc_skb+0x96/0x270 [] __napi_alloc_skb+0x6c/0x170 [] napi_get_frags+0x3c/0x80 [] netif_napi_add_weight+0x1b5/0x3c0 [] wg_peer_create+0x209/0x2b0 [] set_peer+0x610/0x8c0 [] wg_set_device+0x36a/0x6c0 [] genl_family_rcv_msg_doit+0x113/0x180 [] genl_rcv_msg+0x174/0x2c0 [] netlink_rcv_skb+0x87/0x1d0 [] genl_rcv+0x24/0x40 [] netlink_unicast+0x397/0x4c0 [] netlink_sendmsg+0x396/0x710 [] sock_sendmsg+0x56/0x80 [] __sys_sendto+0x168/0x210