Warning: Permanently added '10.128.1.37' (ED25519) to the list of known hosts. 2024/01/17 07:00:25 ignoring optional flag "sandboxArg"="0" 2024/01/17 07:00:25 parsed 1 programs [ 70.209696][ T22] cfg80211: failed to load regulatory.db [ 72.576047][ T5368] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 2024/01/17 07:00:33 executed programs: 0 [ 73.321198][ T5368] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 73.359635][ T4432] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 73.366863][ T4432] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 73.374028][ T4432] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 73.381708][ T4432] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 73.389115][ T4432] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 73.396586][ T4432] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 73.478512][ T5377] chnl_net:caif_netlink_parms(): no params data found [ 73.515267][ T5377] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.522441][ T5377] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.529799][ T5377] bridge_slave_0: entered allmulticast mode [ 73.536570][ T5377] bridge_slave_0: entered promiscuous mode [ 73.543584][ T5377] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.550806][ T5377] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.557970][ T5377] bridge_slave_1: entered allmulticast mode [ 73.564465][ T5377] bridge_slave_1: entered promiscuous mode [ 73.581665][ T5377] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.592516][ T5377] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.612641][ T5377] team0: Port device team_slave_0 added [ 73.619684][ T5377] team0: Port device team_slave_1 added [ 73.635980][ T5377] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.643002][ T5377] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.669349][ T5377] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.681100][ T5377] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.688188][ T5377] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.714161][ T5377] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.740421][ T5377] hsr_slave_0: entered promiscuous mode [ 73.746391][ T5377] hsr_slave_1: entered promiscuous mode [ 74.156266][ T5377] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 74.165475][ T5377] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 74.175670][ T5377] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 74.185530][ T5377] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 74.206818][ T5377] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.214000][ T5377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.223132][ T5377] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.230295][ T5377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.282511][ T5377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.297299][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.304867][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.317873][ T5377] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.329884][ T5038] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.337061][ T5038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.355642][ T1657] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.362820][ T1657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.389034][ T5377] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.460625][ T5377] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.497779][ T5377] veth0_vlan: entered promiscuous mode [ 74.509277][ T5377] veth1_vlan: entered promiscuous mode [ 74.534026][ T5377] veth0_macvtap: entered promiscuous mode [ 74.543846][ T5377] veth1_macvtap: entered promiscuous mode [ 74.561238][ T5377] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.574450][ T5377] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.585653][ T5377] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.595279][ T5377] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.604784][ T5377] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.614030][ T5377] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.656092][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.668231][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.690023][ T57] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.698379][ T57] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.724794][ T5480] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 75.406433][ T49] Bluetooth: hci0: command 0x0409 tx timeout [ 77.496433][ T49] Bluetooth: hci0: command 0x041b tx timeout [ 79.566406][ T49] Bluetooth: hci0: command 0x040f tx timeout 2024/01/17 07:00:40 executed programs: 1 [ 81.646444][ T49] Bluetooth: hci0: command 0x0419 tx timeout [ 81.729015][ T5743] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 87.927297][ T5743] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810d47c500 (size 240): comm "syz-executor.0", pid 5480, jiffies 4294944710 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 70 b4 1c 81 88 ff ff 00 00 00 00 00 00 00 00 .p.............. backtrace (crc 70123212): [] kmem_cache_alloc_node+0x28a/0x330 [] __alloc_skb+0x1ef/0x230 [] sctp_packet_transmit+0xa7/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x500 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xabd/0xad0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] __sock_sendmsg+0x52/0xa0 [] __sys_sendto+0x164/0x1e0 BUG: memory leak unreferenced object 0xffff88810d912a00 (size 640): comm "syz-executor.0", pid 5480, jiffies 4294944710 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc eafbecfe): [] kmem_cache_alloc_node+0x28a/0x330 [] kmalloc_reserve+0xe2/0x170 [] __alloc_skb+0xd5/0x230 [] sctp_packet_transmit+0xa7/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x500 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xabd/0xad0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] __sock_sendmsg+0x52/0xa0 BUG: memory leak unreferenced object 0xffff88810c610500 (size 640): comm "syz-executor.0", pid 5742, jiffies 4294945293 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 85eb2c9e): [] kmem_cache_alloc_node+0x28a/0x330 [] kmalloc_reserve+0xe2/0x170 [] __alloc_skb+0xd5/0x230 [] sctp_packet_transmit+0xa7/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x500 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xabd/0xad0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] __sock_sendmsg+0x52/0xa0