Warning: Permanently added '10.128.0.22' (ECDSA) to the list of known hosts. 2021/05/26 12:54:28 parsed 1 programs 2021/05/26 12:54:35 executed programs: 0 [ 1077.505270][ T8441] chnl_net:caif_netlink_parms(): no params data found [ 1077.523240][ T8441] bridge0: port 1(bridge_slave_0) entered blocking state [ 1077.531258][ T8441] bridge0: port 1(bridge_slave_0) entered disabled state [ 1077.538649][ T8441] device bridge_slave_0 entered promiscuous mode [ 1077.545984][ T8441] bridge0: port 2(bridge_slave_1) entered blocking state [ 1077.553309][ T8441] bridge0: port 2(bridge_slave_1) entered disabled state [ 1077.560706][ T8441] device bridge_slave_1 entered promiscuous mode [ 1077.571446][ T8441] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1077.581268][ T8441] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1077.594172][ T8441] team0: Port device team_slave_0 added [ 1077.600727][ T8441] team0: Port device team_slave_1 added [ 1077.610115][ T8441] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1077.617056][ T8441] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1077.643627][ T8441] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1077.654808][ T8441] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1077.661775][ T8441] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1077.688428][ T8441] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1077.704043][ T8441] device hsr_slave_0 entered promiscuous mode [ 1077.710566][ T8441] device hsr_slave_1 entered promiscuous mode [ 1077.740127][ T8441] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1077.747729][ T8441] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1077.755730][ T8441] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1077.763477][ T8441] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1077.774868][ T8441] bridge0: port 2(bridge_slave_1) entered blocking state [ 1077.782342][ T8441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1077.789602][ T8441] bridge0: port 1(bridge_slave_0) entered blocking state [ 1077.796628][ T8441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1077.815460][ T8441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1077.826047][ T8441] 8021q: adding VLAN 0 to HW filter on device team0 [ 1077.833646][ T8662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1077.841520][ T8662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1077.848944][ T8662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1077.856715][ T8662] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1077.865804][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1077.874163][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1077.881396][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1077.890387][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1077.898925][ T8540] bridge0: port 2(bridge_slave_1) entered blocking state [ 1077.906216][ T8540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1077.921396][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1077.930175][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1077.938318][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1077.946922][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1077.955425][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1077.964819][ T8441] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1077.976783][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1077.984723][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1077.995009][ T8441] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1078.007076][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1078.019781][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1078.028115][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1078.036070][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1078.045200][ T8441] device veth0_vlan entered promiscuous mode [ 1078.053782][ T8441] device veth1_vlan entered promiscuous mode [ 1078.065514][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1078.073388][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1078.082200][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1078.091740][ T8441] device veth0_macvtap entered promiscuous mode [ 1078.099434][ T8441] device veth1_macvtap entered promiscuous mode [ 1078.110512][ T8441] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1078.117749][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1078.127144][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1078.136842][ T8441] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1078.144310][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1078.153925][ T8441] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1078.163130][ T8441] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1078.171955][ T8441] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1078.180908][ T8441] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1078.214225][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1078.222561][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1078.227996][ T8477] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1078.236858][ T4831] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1078.246878][ T8477] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1078.256127][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1078.273205][ T8686] device batadv0 entered promiscuous mode [ 1078.279015][ T8686] device vlan2 entered promiscuous mode [ 1078.285803][ T8686] device batadv0 left promiscuous mode [ 1079.509743][ T4831] Bluetooth: hci0: command 0x0409 tx timeout [ 1081.579684][ T4831] Bluetooth: hci0: command 0x041b tx timeout [ 1083.659814][ T8416] Bluetooth: hci0: command 0x040f tx timeout 2021/05/26 12:54:43 executed programs: 1 [ 1083.802019][ T8697] device batadv0 entered promiscuous mode [ 1083.808390][ T8697] device vlan2 entered promiscuous mode [ 1083.814615][ T8697] device batadv0 left promiscuous mode [ 1083.860979][ T8702] device batadv0 entered promiscuous mode [ 1083.867129][ T8702] device vlan2 entered promiscuous mode [ 1083.873668][ T8702] device batadv0 left promiscuous mode [ 1085.088629][ T8709] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1085.739614][ T8416] Bluetooth: hci0: command 0x0419 tx timeout [ 1091.485665][ T8709] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888118b26180 (size 64): comm "syz-executor.0", pid 8686, jiffies 4295045093 (age 13.280s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 01 ................ backtrace: [] garp_request_join+0x138/0x220 [] vlan_gvrp_request_join+0x96/0xa0 [] vlan_dev_open+0x1f9/0x330 [] __dev_open+0x175/0x260 [] __dev_change_flags+0x2fa/0x390 [] rtnl_configure_link+0x64/0x130 [] __rtnl_newlink+0xa74/0xdb0 [] rtnl_newlink+0x49/0x70 [] rtnetlink_rcv_msg+0x1fc/0x520 [] netlink_rcv_skb+0x87/0x1d0 [] netlink_unicast+0x392/0x4c0 [] netlink_sendmsg+0x368/0x6a0 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0x8b/0xd0 [] __sys_sendmsg+0x88/0x100 BUG: memory leak unreferenced object 0xffff888118b26d00 (size 64): comm "syz-executor.0", pid 8697, jiffies 4295045646 (age 7.750s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 01 ................ backtrace: [] garp_request_join+0x138/0x220 [] vlan_gvrp_request_join+0x96/0xa0 [] vlan_dev_open+0x1f9/0x330 [] __dev_open+0x175/0x260 [] __dev_change_flags+0x2fa/0x390 [] rtnl_configure_link+0x64/0x130 [] __rtnl_newlink+0xa74/0xdb0 [] rtnl_newlink+0x49/0x70 [] rtnetlink_rcv_msg+0x1fc/0x520 [] netlink_rcv_skb+0x87/0x1d0 [] netlink_unicast+0x392/0x4c0 [] netlink_sendmsg+0x368/0x6a0 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0x8b/0xd0 [] __sys_sendmsg+0x88/0x100 BUG: memory leak unreferenced object 0xffff888118ab1400 (size 64): comm "syz-executor.0", pid 8702, jiffies 4295045652 (age 7.690s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 01 ................ backtrace: [] garp_request_join+0x138/0x220 [] vlan_gvrp_request_join+0x96/0xa0 [] vlan_dev_open+0x1f9/0x330 [] __dev_open+0x175/0x260 [] __dev_change_flags+0x2fa/0x390 [] rtnl_configure_link+0x64/0x130 [] __rtnl_newlink+0xa74/0xdb0 [] rtnl_newlink+0x49/0x70 [] rtnetlink_rcv_msg+0x1fc/0x520 [] netlink_rcv_skb+0x87/0x1d0 [] netlink_unicast+0x392/0x4c0 [] netlink_sendmsg+0x368/0x6a0 [] sock_sendmsg+0x56/0x80 [] ____sys_sendmsg+0x36c/0x390 [] ___sys_sendmsg+0x8b/0xd0 [] __sys_sendmsg+0x88/0x100