[ 40.852487][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.860403][ T53] device veth1_macvtap left promiscuous mode [ 40.866366][ T53] device veth0_macvtap left promiscuous mode [ 40.872529][ T53] device veth1_vlan left promiscuous mode [ 40.878291][ T53] device veth0_vlan left promiscuous mode [ 40.902488][ T53] team0 (unregistering): Port device team_slave_1 removed [ 40.910367][ T53] team0 (unregistering): Port device team_slave_0 removed [ 40.918506][ T53] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 40.927601][ T53] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 40.943032][ T53] bond0 (unregistering): Released all slaves Warning: Permanently added '10.128.0.118' (ECDSA) to the list of known hosts. 2022/11/20 10:27:20 ignoring optional flag "sandboxArg"="0" 2022/11/20 10:27:20 parsed 1 programs [ 52.804804][ T4049] cgroup: Unknown subsys name 'net' [ 52.811323][ T4049] cgroup: Unknown subsys name 'rlimit' 2022/11/20 10:27:27 executed programs: 0 [ 60.758517][ T45] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 60.765566][ T45] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 60.772557][ T45] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 60.779764][ T3604] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 60.786864][ T3604] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 60.793947][ T3604] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 60.822131][ T4062] chnl_net:caif_netlink_parms(): no params data found [ 60.838855][ T4062] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.846019][ T4062] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.853594][ T4062] device bridge_slave_0 entered promiscuous mode [ 60.860519][ T4062] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.867538][ T4062] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.874983][ T4062] device bridge_slave_1 entered promiscuous mode [ 60.885133][ T4062] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.894849][ T4062] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.907373][ T4062] team0: Port device team_slave_0 added [ 60.913606][ T4062] team0: Port device team_slave_1 added [ 60.922650][ T4062] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.929581][ T4062] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.955438][ T4062] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.966366][ T4062] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.973314][ T4062] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.999261][ T4062] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 61.014465][ T4062] device hsr_slave_0 entered promiscuous mode [ 61.020731][ T4062] device hsr_slave_1 entered promiscuous mode [ 61.043111][ T4062] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.050149][ T4062] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.057355][ T4062] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.064376][ T4062] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.081458][ T4062] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.089569][ T2501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.097065][ T2501] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.104616][ T2501] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.112095][ T2501] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 61.120687][ T4062] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.128394][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.136519][ T3614] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.143550][ T3614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.151819][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.159987][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.167011][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.178982][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.187073][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.195390][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.203712][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.212869][ T4062] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.223440][ T4062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.231057][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.242342][ T4062] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.249386][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.256710][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.300750][ T4062] device veth0_vlan entered promiscuous mode [ 61.308038][ T2501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 61.316340][ T2501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.324999][ T2501] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.332427][ T2501] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.339952][ T4062] device veth1_vlan entered promiscuous mode [ 61.346201][ T2501] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 61.357417][ T4062] device veth0_macvtap entered promiscuous mode [ 61.364063][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 61.372051][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.380159][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 61.388458][ T4062] device veth1_macvtap entered promiscuous mode [ 61.397021][ T4062] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 61.404367][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 61.413870][ T4062] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 61.421252][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 61.440558][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 61.448965][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 61.454546][ T1118] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 61.456309][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 61.464863][ T1118] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 61.478974][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 62.838090][ T42] Bluetooth: hci0: command 0x0409 tx timeout [ 64.917784][ T42] Bluetooth: hci0: command 0x041b tx timeout 2022/11/20 10:27:34 executed programs: 1 [ 67.007825][ T3614] Bluetooth: hci0: command 0x040f tx timeout [ 67.638585][ T4088] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 69.077740][ T42] Bluetooth: hci0: command 0x0419 tx timeout [ 69.877862][ T139] cfg80211: failed to load regulatory.db [ 69.881024][ T1231] ieee802154 phy0 wpan0: encryption failed: -22 [ 69.889746][ T1231] ieee802154 phy1 wpan1: encryption failed: -22 [ 73.718001][ T4088] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810f6e2c80 (size 64): comm "syz-executor.0", pid 4081, jiffies 4294943417 (age 12.280s) hex dump (first 32 bytes): 80 2c 6e 0f 81 88 ff ff 80 2c 6e 0f 81 88 ff ff .,n......,n..... 90 2c 6e 0f 81 88 ff ff 90 2c 6e 0f 81 88 ff ff .,n......,n..... backtrace: [] sctp_sched_prio_set+0x2c4/0x370 [] sctp_stream_init_ext+0x86/0xf0 [] sctp_sendmsg_to_asoc+0xc74/0xde0 [] sctp_sendmsg+0x99f/0x1030 [] inet_sendmsg+0x45/0x70 [] sock_sendmsg+0x56/0x80 [] __sys_sendto+0x15c/0x200 [] __x64_sys_sendto+0x26/0x30 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881134c3a00 (size 64): comm "syz-executor.0", pid 4084, jiffies 4294943930 (age 7.150s) hex dump (first 32 bytes): 00 3a 4c 13 81 88 ff ff 00 3a 4c 13 81 88 ff ff .:L......:L..... 10 3a 4c 13 81 88 ff ff 10 3a 4c 13 81 88 ff ff .:L......:L..... backtrace: [] sctp_sched_prio_set+0x2c4/0x370 [] sctp_stream_init_ext+0x86/0xf0 [] sctp_sendmsg_to_asoc+0xc74/0xde0 [] sctp_sendmsg+0x99f/0x1030 [] inet_sendmsg+0x45/0x70 [] sock_sendmsg+0x56/0x80 [] __sys_sendto+0x15c/0x200 [] __x64_sys_sendto+0x26/0x30 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88810f6e2b80 (size 64): comm "syz-executor.0", pid 4086, jiffies 4294943931 (age 7.140s) hex dump (first 32 bytes): 80 2b 6e 0f 81 88 ff ff 80 2b 6e 0f 81 88 ff ff .+n......+n..... 90 2b 6e 0f 81 88 ff ff 90 2b 6e 0f 81 88 ff ff .+n......+n..... backtrace: [] sctp_sched_prio_set+0x2c4/0x370 [] sctp_stream_init_ext+0x86/0xf0 [] sctp_sendmsg_to_asoc+0xc74/0xde0 [] sctp_sendmsg+0x99f/0x1030 [] inet_sendmsg+0x45/0x70 [] sock_sendmsg+0x56/0x80 [] __sys_sendto+0x15c/0x200 [] __x64_sys_sendto+0x26/0x30 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae