Warning: Permanently added '10.128.1.133' (ED25519) to the list of known hosts. 2023/08/30 02:58:51 ignoring optional flag "sandboxArg"="0" 2023/08/30 02:58:51 parsed 1 programs [ 75.322878][ T1779] cfg80211: failed to load regulatory.db 2023/08/30 02:58:59 executed programs: 0 [ 75.502678][ T5365] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.512938][ T5364] syz-execprog[5364]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 75.523636][ T5364] syz-execprog[5364]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 75.563246][ T4429] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 75.570389][ T5022] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 75.578284][ T5022] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 75.585978][ T5022] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 75.593441][ T5022] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 75.670693][ T5373] chnl_net:caif_netlink_parms(): no params data found [ 75.707242][ T5373] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.714634][ T5373] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.721790][ T5373] bridge_slave_0: entered allmulticast mode [ 75.728704][ T5373] bridge_slave_0: entered promiscuous mode [ 75.735633][ T5373] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.743071][ T5373] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.750189][ T5373] bridge_slave_1: entered allmulticast mode [ 75.757373][ T5373] bridge_slave_1: entered promiscuous mode [ 75.775025][ T5373] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.785602][ T5373] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.806453][ T5373] team0: Port device team_slave_0 added [ 75.813748][ T5373] team0: Port device team_slave_1 added [ 75.830249][ T5373] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.837434][ T5373] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.864261][ T5373] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.876672][ T5373] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.884082][ T5373] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.910700][ T5373] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.938721][ T5373] hsr_slave_0: entered promiscuous mode [ 75.945031][ T5373] hsr_slave_1: entered promiscuous mode [ 76.491393][ T5373] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 76.500954][ T5373] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 76.510548][ T5373] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 76.519719][ T5373] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 76.540841][ T5373] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.548302][ T5373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.556465][ T5373] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.564319][ T5373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.617125][ T5373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.631773][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.640026][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.654971][ T5373] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.669393][ T5034] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.676945][ T5034] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.702356][ T5034] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.710068][ T5034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.797280][ T5373] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.833379][ T5373] veth0_vlan: entered promiscuous mode [ 76.844927][ T5373] veth1_vlan: entered promiscuous mode [ 76.870028][ T5373] veth0_macvtap: entered promiscuous mode [ 76.879361][ T5373] veth1_macvtap: entered promiscuous mode [ 76.895849][ T5373] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 76.909068][ T5373] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 76.920838][ T5373] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.930488][ T5373] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.940647][ T5373] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.950786][ T5373] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.995421][ T7] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.003443][ T7] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.028584][ T5034] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.037933][ T5034] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.642645][ T47] Bluetooth: hci0: command 0x0409 tx timeout [ 79.722697][ T5022] Bluetooth: hci0: command 0x041b tx timeout [ 81.802721][ T5022] Bluetooth: hci0: command 0x040f tx timeout 2023/08/30 02:59:07 executed programs: 1 [ 83.882650][ T5022] Bluetooth: hci0: command 0x0419 tx timeout 2023/08/30 02:59:13 executed programs: 3 [ 90.744642][ T5743] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 95.147048][ T5743] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 97.575629][ T5743] kmemleak: 59 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810d3d2100 (size 240): comm "syz-executor.0", pid 5734, jiffies 4294945576 (age 14.210s) hex dump (first 32 bytes): 00 2b 3d 0d 81 88 ff ff 00 00 00 00 00 00 00 00 .+=............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0x1ef/0x230 [] kcm_sendmsg+0x269/0x1050 [] sock_sendmsg+0x56/0xb0 [] ____sys_sendmsg+0x365/0x470 [] ___sys_sendmsg+0xc9/0x130 [] __sys_sendmsg+0xa6/0x120 [] do_syscall_64+0x38/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888106e36280 (size 640): comm "syz-executor.0", pid 5734, jiffies 4294945576 (age 14.210s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc_reserve+0xe1/0x180 [] __alloc_skb+0xd5/0x230 [] kcm_sendmsg+0x269/0x1050 [] sock_sendmsg+0x56/0xb0 [] ____sys_sendmsg+0x365/0x470 [] ___sys_sendmsg+0xc9/0x130 [] __sys_sendmsg+0xa6/0x120 [] do_syscall_64+0x38/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888100959600 (size 240): comm "syz-executor.0", pid 5742, jiffies 4294946168 (age 8.290s) hex dump (first 32 bytes): 00 99 95 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0x1ef/0x230 [] kcm_sendmsg+0x269/0x1050 [] sock_sendmsg+0x56/0xb0 [] ____sys_sendmsg+0x365/0x470 [] ___sys_sendmsg+0xc9/0x130 [] __sys_sendmsg+0xa6/0x120 [] do_syscall_64+0x38/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888106e39b80 (size 640): comm "syz-executor.0", pid 5742, jiffies 4294946168 (age 8.290s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc_reserve+0xe1/0x180 [] __alloc_skb+0xd5/0x230 [] kcm_sendmsg+0x269/0x1050 [] sock_sendmsg+0x56/0xb0 [] ____sys_sendmsg+0x365/0x470 [] ___sys_sendmsg+0xc9/0x130 [] __sys_sendmsg+0xa6/0x120 [] do_syscall_64+0x38/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888100959900 (size 240): comm "syz-executor.0", pid 5742, jiffies 4294946168 (age 8.290s) hex dump (first 32 bytes): 00 40 34 0d 81 88 ff ff 00 00 00 00 00 00 00 00 .@4............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0x1ef/0x230 [] kcm_sendmsg+0x269/0x1050 [] sock_sendmsg+0x56/0xb0 [] ____sys_sendmsg+0x365/0x470 [] ___sys_sendmsg+0xc9/0x130 [] __sys_sendmsg+0xa6/0x120 [] do_syscall_64+0x38/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd