Warning: Permanently added '10.128.1.59' (ECDSA) to the list of known hosts. 2022/08/18 05:55:18 ignoring optional flag "sandboxArg"="0" 2022/08/18 05:55:18 parsed 1 programs [ 1112.553342][ T3666] cgroup: Unknown subsys name 'net' [ 1112.687211][ T3666] cgroup: Unknown subsys name 'rlimit' 2022/08/18 05:55:25 executed programs: 0 [ 1120.026687][ T3666] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1121.146264][ T3676] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1121.153357][ T3676] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1121.160436][ T3676] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1121.167691][ T3676] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1121.174834][ T3676] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1121.182017][ T3676] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1121.210483][ T3673] chnl_net:caif_netlink_parms(): no params data found [ 1121.227310][ T3673] bridge0: port 1(bridge_slave_0) entered blocking state [ 1121.234374][ T3673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1121.241742][ T3673] device bridge_slave_0 entered promiscuous mode [ 1121.248704][ T3673] bridge0: port 2(bridge_slave_1) entered blocking state [ 1121.255780][ T3673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.263007][ T3673] device bridge_slave_1 entered promiscuous mode [ 1121.273304][ T3673] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1121.283181][ T3673] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1121.296014][ T3673] team0: Port device team_slave_0 added [ 1121.302175][ T3673] team0: Port device team_slave_1 added [ 1121.311307][ T3673] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1121.318264][ T3673] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1121.344231][ T3673] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1121.355324][ T3673] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1121.362255][ T3673] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1121.388288][ T3673] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1121.403530][ T3673] device hsr_slave_0 entered promiscuous mode [ 1121.409842][ T3673] device hsr_slave_1 entered promiscuous mode [ 1121.433871][ T3673] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1121.441220][ T3673] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1121.448551][ T3673] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1121.456031][ T3673] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1121.466649][ T3673] bridge0: port 2(bridge_slave_1) entered blocking state [ 1121.473674][ T3673] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1121.480915][ T3673] bridge0: port 1(bridge_slave_0) entered blocking state [ 1121.487949][ T3673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1121.506508][ T3673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1121.514861][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1121.522708][ T143] bridge0: port 1(bridge_slave_0) entered disabled state [ 1121.530720][ T143] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.538228][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1121.546828][ T3673] 8021q: adding VLAN 0 to HW filter on device team0 [ 1121.555657][ T3682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1121.563786][ T3682] bridge0: port 1(bridge_slave_0) entered blocking state [ 1121.570830][ T3682] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1121.578381][ T3682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1121.586586][ T3682] bridge0: port 2(bridge_slave_1) entered blocking state [ 1121.593611][ T3682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1121.603808][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1121.611981][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1121.622619][ T3673] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1121.633011][ T3673] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1121.644326][ T3682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1121.652488][ T3682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1121.660598][ T3682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1121.668798][ T3682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1121.679623][ T3673] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1121.686775][ T3683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1121.694069][ T3683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1121.725396][ T3682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1121.735745][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1121.743731][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1121.751222][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1121.759321][ T3673] device veth0_vlan entered promiscuous mode [ 1121.766782][ T3673] device veth1_vlan entered promiscuous mode [ 1121.776766][ T3673] device veth0_macvtap entered promiscuous mode [ 1121.784226][ T3673] device veth1_macvtap entered promiscuous mode [ 1121.791136][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1121.798930][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1121.806752][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1121.814786][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1121.825015][ T3673] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1121.832303][ T3682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1121.841834][ T3673] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1121.849507][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1121.858504][ T3673] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1121.867269][ T3673] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1121.875946][ T3673] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1121.884617][ T3673] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1121.907514][ T3693] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 1123.225426][ T3681] Bluetooth: hci0: command 0x0409 tx timeout [ 1125.305275][ T3681] Bluetooth: hci0: command 0x041b tx timeout 2022/08/18 05:55:33 executed programs: 1 [ 1127.385429][ T3681] Bluetooth: hci0: command 0x040f tx timeout [ 1129.465217][ T44] Bluetooth: hci0: command 0x0419 tx timeout 2022/08/18 05:55:38 executed programs: 3 2022/08/18 05:55:44 executed programs: 5 2022/08/18 05:55:49 executed programs: 7 [ 1149.461524][ T3711] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810d940100 (size 240): comm "syz-executor.0", pid 3673, jiffies 4295049415 (age 30.300s) hex dump (first 32 bytes): a0 6c bd 11 81 88 ff ff a0 6c bd 11 81 88 ff ff .l.......l...... 00 40 a3 13 81 88 ff ff 00 00 00 00 00 00 00 00 .@.............. backtrace: [] napi_skb_cache_get+0x6b/0x90 [] __alloc_skb+0x96/0x270 [] __napi_alloc_skb+0x6c/0x170 [] napi_get_frags+0x3c/0x80 [] netif_napi_add_weight+0x1b5/0x3c0 [] wg_peer_create+0x209/0x2b0 [] set_peer+0x610/0x8c0 [] wg_set_device+0x36a/0x6c0 [] genl_family_rcv_msg_doit+0x113/0x180 [] genl_rcv_msg+0x174/0x2c0 [] netlink_rcv_skb+0x87/0x1d0 [] genl_rcv+0x24/0x40 [] netlink_unicast+0x397/0x4c0 [] netlink_sendmsg+0x396/0x710 [] sock_sendmsg+0x56/0x80 [] __sys_sendto+0x168/0x210 BUG: memory leak unreferenced object 0xffff88810d942400 (size 240): comm "syz-executor.0", pid 3673, jiffies 4295049415 (age 30.300s) hex dump (first 32 bytes): a0 34 93 13 81 88 ff ff a0 34 93 13 81 88 ff ff .4.......4...... 00 80 a3 13 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] napi_skb_cache_get+0x6b/0x90 [] __alloc_skb+0x96/0x270 [] __napi_alloc_skb+0x6c/0x170 [] napi_get_frags+0x3c/0x80 [] netif_napi_add_weight+0x1b5/0x3c0 [] wg_peer_create+0x209/0x2b0 [] set_peer+0x610/0x8c0 [] wg_set_device+0x36a/0x6c0 [] genl_family_rcv_msg_doit+0x113/0x180 [] genl_rcv_msg+0x174/0x2c0 [] netlink_rcv_skb+0x87/0x1d0 [] genl_rcv+0x24/0x40 [] netlink_unicast+0x397/0x4c0 [] netlink_sendmsg+0x396/0x710 [] sock_sendmsg+0x56/0x80 [] __sys_sendto+0x168/0x210 BUG: memory leak unreferenced object 0xffff888113b31400 (size 1024): comm "syz-executor.0", pid 3703, jiffies 4295051117 (age 13.280s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0xdd/0x270 [] __napi_alloc_skb+0x6c/0x170 [] napi_get_frags+0x3c/0x80 [] tun_get_user+0xb53/0x1df0 [] tun_chr_write_iter+0x6d/0x110 [] vfs_write+0x42d/0x540 [] ksys_write+0x9d/0x160 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd