Warning: Permanently added '10.128.0.249' (ED25519) to the list of known hosts. 2023/10/25 01:14:30 ignoring optional flag "sandboxArg"="0" 2023/10/25 01:14:30 parsed 1 programs [ 557.738096][ T5054] cgroup: Unknown subsys name 'net' [ 557.872460][ T5054] cgroup: Unknown subsys name 'rlimit' 2023/10/25 01:14:39 executed programs: 0 [ 566.201957][ T5054] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 566.211797][ T5049] syz-execprog[5049]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 566.266542][ T5062] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 566.273767][ T5062] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 566.280970][ T5062] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 566.288615][ T5062] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 566.295930][ T5062] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 566.303046][ T5062] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 566.432214][ T5061] chnl_net:caif_netlink_parms(): no params data found [ 566.490828][ T5061] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.498013][ T5061] bridge0: port 1(bridge_slave_0) entered disabled state [ 566.505242][ T5061] bridge_slave_0: entered allmulticast mode [ 566.512162][ T5061] bridge_slave_0: entered promiscuous mode [ 566.519910][ T5061] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.527390][ T5061] bridge0: port 2(bridge_slave_1) entered disabled state [ 566.534604][ T5061] bridge_slave_1: entered allmulticast mode [ 566.541480][ T5061] bridge_slave_1: entered promiscuous mode [ 566.567083][ T5061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 566.578553][ T5061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 566.606852][ T5061] team0: Port device team_slave_0 added [ 566.614469][ T5061] team0: Port device team_slave_1 added [ 566.638217][ T5061] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 566.645214][ T5061] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 566.671199][ T5061] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 566.683058][ T5061] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 566.690063][ T5061] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 566.715998][ T5061] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 566.754233][ T5061] hsr_slave_0: entered promiscuous mode [ 566.760359][ T5061] hsr_slave_1: entered promiscuous mode [ 566.866457][ T1230] ieee802154 phy0 wpan0: encryption failed: -22 [ 566.868720][ T5061] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 566.873284][ T1230] ieee802154 phy1 wpan1: encryption failed: -22 [ 566.888033][ T5061] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 566.897158][ T5061] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 566.907150][ T5061] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 566.929305][ T5061] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.936459][ T5061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 566.943793][ T5061] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.950949][ T5061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 567.006073][ T5061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 567.022812][ T5061] 8021q: adding VLAN 0 to HW filter on device team0 [ 567.031100][ T4762] bridge0: port 1(bridge_slave_0) entered disabled state [ 567.038993][ T4762] bridge0: port 2(bridge_slave_1) entered disabled state [ 567.055087][ T5070] bridge0: port 1(bridge_slave_0) entered blocking state [ 567.062244][ T5070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 567.075070][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 567.082221][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 567.176309][ T5061] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 567.212186][ T5061] veth0_vlan: entered promiscuous mode [ 567.222628][ T5061] veth1_vlan: entered promiscuous mode [ 567.248314][ T5061] veth0_macvtap: entered promiscuous mode [ 567.257775][ T5061] veth1_macvtap: entered promiscuous mode [ 567.275594][ T5061] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 567.289546][ T5061] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 567.299807][ T5061] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 567.308587][ T5061] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 567.317430][ T5061] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 567.326330][ T5061] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 567.374890][ T5078] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 567.382728][ T5078] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 567.405169][ T41] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 567.413022][ T41] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 567.451275][ T5082] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 568.384131][ T5062] Bluetooth: hci0: command 0x0409 tx timeout [ 570.464135][ T5062] Bluetooth: hci0: command 0x041b tx timeout [ 572.544472][ T5062] Bluetooth: hci0: command 0x040f tx timeout 2023/10/25 01:14:46 executed programs: 1 [ 574.309404][ T5088] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 574.624136][ T5062] Bluetooth: hci0: command 0x0419 tx timeout BUG: memory leak unreferenced object 0xffff88810ca4e400 (size 240): comm "syz-executor.0", pid 5082, jiffies 4294993979 (age 13.440s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 a0 b4 0d 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0x1ef/0x230 [] sctp_packet_transmit+0xa7/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x500 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xabd/0xad0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] __sock_sendmsg+0x52/0xa0 [] __sys_sendto+0x17e/0x200 [] __x64_sys_sendto+0x28/0x30 BUG: memory leak unreferenced object 0xffff888109779b80 (size 640): comm "syz-executor.0", pid 5082, jiffies 4294993979 (age 13.440s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc_reserve+0xe2/0x170 [] __alloc_skb+0xd5/0x230 [] sctp_packet_transmit+0xa7/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x500 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xabd/0xad0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] __sock_sendmsg+0x52/0xa0 [] __sys_sendto+0x17e/0x200 BUG: memory leak unreferenced object 0xffff88810ca4e700 (size 240): comm "syz-executor.0", pid 5082, jiffies 4294993979 (age 13.440s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0x1ef/0x230 [] sctp_packet_transmit+0x448/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x500 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xabd/0xad0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] __sock_sendmsg+0x52/0xa0 [] __sys_sendto+0x17e/0x200 [] __x64_sys_sendto+0x28/0x30