Warning: Permanently added '10.128.1.122' (ECDSA) to the list of known hosts. 2022/11/05 01:13:41 ignoring optional flag "sandboxArg"="0" 2022/11/05 01:13:41 parsed 1 programs [ 60.638358][ T3995] cgroup: Unknown subsys name 'net' [ 60.645237][ T3995] cgroup: Unknown subsys name 'rlimit' 2022/11/05 01:13:48 executed programs: 0 [ 69.067445][ T44] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.074658][ T44] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.081670][ T44] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.088903][ T44] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.096082][ T44] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 69.103392][ T44] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 69.110761][ T4068] Bluetooth: hci0: HCI_REQ-0x0c1a [ 69.136929][ T4068] chnl_net:caif_netlink_parms(): no params data found [ 69.154146][ T4068] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.161296][ T4068] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.169143][ T4068] device bridge_slave_0 entered promiscuous mode [ 69.176028][ T4068] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.183218][ T4068] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.190576][ T4068] device bridge_slave_1 entered promiscuous mode [ 69.201302][ T4068] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.211140][ T4068] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.223968][ T4068] team0: Port device team_slave_0 added [ 69.230184][ T4068] team0: Port device team_slave_1 added [ 69.239431][ T4068] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.246437][ T4068] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.272442][ T4068] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.283409][ T4068] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.290398][ T4068] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.316516][ T4068] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.332007][ T4068] device hsr_slave_0 entered promiscuous mode [ 69.338457][ T4068] device hsr_slave_1 entered promiscuous mode [ 69.361104][ T4068] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.368285][ T4068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.375583][ T4068] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.382714][ T4068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.399188][ T4068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.407724][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.415286][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.422729][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.430389][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 69.439372][ T4068] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.447414][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.455676][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.462902][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.475321][ T4068] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 69.485813][ T4068] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 69.497344][ T3620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.505517][ T3620] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.512579][ T3620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.520492][ T3620] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.528672][ T3620] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.537062][ T3620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.544976][ T3620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.552994][ T3620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 69.560469][ T3620] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.570841][ T3265] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 69.579156][ T3265] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 69.587823][ T4068] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.663756][ T4068] device veth0_vlan entered promiscuous mode [ 69.671506][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 69.680277][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.688417][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.695785][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.703541][ T4068] device veth1_vlan entered promiscuous mode [ 69.710385][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 69.721418][ T3265] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 69.729213][ T3265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.738078][ T4068] device veth0_macvtap entered promiscuous mode [ 69.745183][ T4068] device veth1_macvtap entered promiscuous mode [ 69.754958][ T4068] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 69.762341][ T3620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.771006][ T3620] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 69.780079][ T4068] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 69.787545][ T3265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.807672][ T52] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.815482][ T52] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.824674][ T3265] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 69.835006][ T82] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.842971][ T82] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.850675][ T3620] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 69.867215][ T90] cfg80211: failed to load regulatory.db [ 69.873485][ T1237] ieee802154 phy0 wpan0: encryption failed: -22 [ 69.879983][ T1237] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.146620][ T44] Bluetooth: hci0: command 0x0409 tx timeout [ 73.226564][ T44] Bluetooth: hci0: command 0x041b tx timeout [ 75.306548][ T44] Bluetooth: hci0: command 0x040f tx timeout 2022/11/05 01:13:56 executed programs: 1 [ 77.109133][ T4099] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 77.386564][ T44] Bluetooth: hci0: command 0x0419 tx timeout [ 83.983877][ T4099] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888111261680 (size 64): comm "syz-executor.0", pid 4087, jiffies 4294944255 (age 14.170s) hex dump (first 32 bytes): 80 16 26 11 81 88 ff ff 80 16 26 11 81 88 ff ff ..&.......&..... 90 16 26 11 81 88 ff ff 90 16 26 11 81 88 ff ff ..&.......&..... backtrace: [] kmalloc_trace+0x20/0x90 [] sctp_sched_prio_set+0x2c1/0x370 [] sctp_stream_init_ext+0x86/0xf0 [] sctp_sendmsg_to_asoc+0x96b/0xa40 [] sctp_sendmsg+0x99f/0x1030 [] inet_sendmsg+0x45/0x70 [] sock_sendmsg+0x56/0x80 [] __sys_sendto+0x168/0x210 [] __x64_sys_sendto+0x26/0x30 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888111261940 (size 64): comm "syz-executor.0", pid 4096, jiffies 4294944838 (age 8.340s) hex dump (first 32 bytes): 40 19 26 11 81 88 ff ff 40 19 26 11 81 88 ff ff @.&.....@.&..... 50 19 26 11 81 88 ff ff 50 19 26 11 81 88 ff ff P.&.....P.&..... backtrace: [] kmalloc_trace+0x20/0x90 [] sctp_sched_prio_set+0x2c1/0x370 [] sctp_stream_init_ext+0x86/0xf0 [] sctp_sendmsg_to_asoc+0x96b/0xa40 [] sctp_sendmsg+0x99f/0x1030 [] inet_sendmsg+0x45/0x70 [] sock_sendmsg+0x56/0x80 [] __sys_sendto+0x168/0x210 [] __x64_sys_sendto+0x26/0x30 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888115f86140 (size 64): comm "syz-executor.0", pid 4098, jiffies 4294944839 (age 8.330s) hex dump (first 32 bytes): 40 61 f8 15 81 88 ff ff 40 61 f8 15 81 88 ff ff @a......@a...... 50 61 f8 15 81 88 ff ff 50 61 f8 15 81 88 ff ff Pa......Pa...... backtrace: [] kmalloc_trace+0x20/0x90 [] sctp_sched_prio_set+0x2c1/0x370 [] sctp_stream_init_ext+0x86/0xf0 [] sctp_sendmsg_to_asoc+0x96b/0xa40 [] sctp_sendmsg+0x99f/0x1030 [] inet_sendmsg+0x45/0x70 [] sock_sendmsg+0x56/0x80 [] __sys_sendto+0x168/0x210 [] __x64_sys_sendto+0x26/0x30 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd