Warning: Permanently added '10.128.0.134' (ED25519) to the list of known hosts. 2023/11/22 06:22:31 ignoring optional flag "sandboxArg"="0" 2023/11/22 06:22:31 parsed 1 programs [ 63.668511][ T5371] cgroup: Unknown subsys name 'net' [ 63.676343][ T5371] cgroup: Unknown subsys name 'rlimit' 2023/11/22 06:22:38 executed programs: 0 [ 71.753483][ T48] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.760914][ T48] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.768198][ T48] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.775869][ T48] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.783366][ T48] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.790619][ T48] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.865089][ T5380] chnl_net:caif_netlink_parms(): no params data found [ 71.904497][ T5380] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.912080][ T5380] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.919356][ T5380] bridge_slave_0: entered allmulticast mode [ 71.926064][ T5380] bridge_slave_0: entered promiscuous mode [ 71.933685][ T5380] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.941493][ T5380] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.948828][ T5380] bridge_slave_1: entered allmulticast mode [ 71.955490][ T5380] bridge_slave_1: entered promiscuous mode [ 71.973960][ T5380] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.984919][ T5380] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.005271][ T5380] team0: Port device team_slave_0 added [ 72.012546][ T5380] team0: Port device team_slave_1 added [ 72.029044][ T5380] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.036378][ T5380] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.062996][ T5380] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.074720][ T5380] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.081885][ T5380] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.108684][ T5380] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.133260][ T5380] hsr_slave_0: entered promiscuous mode [ 72.139507][ T5380] hsr_slave_1: entered promiscuous mode [ 72.195461][ T5380] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.202877][ T5380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.210449][ T5380] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.217654][ T5380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.254750][ T5380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.266604][ T33] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.274333][ T33] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.285370][ T5380] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.295609][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.303040][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.321834][ T33] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.334930][ T33] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.365935][ T5380] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.476262][ T5380] veth0_vlan: entered promiscuous mode [ 72.485237][ T5380] veth1_vlan: entered promiscuous mode [ 72.504516][ T5380] veth0_macvtap: entered promiscuous mode [ 72.512716][ T5380] veth1_macvtap: entered promiscuous mode [ 72.525554][ T5380] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.537071][ T5380] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.574533][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.585380][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.601285][ T5044] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.609590][ T5044] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.649110][ T5400] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.0'. [ 73.840801][ T48] Bluetooth: hci0: command 0x0409 tx timeout [ 75.351948][ T22] cfg80211: failed to load regulatory.db [ 75.910815][ T48] Bluetooth: hci0: command 0x041b tx timeout 2023/11/22 06:22:45 executed programs: 1 [ 77.990869][ T48] Bluetooth: hci0: command 0x040f tx timeout [ 80.070793][ T48] Bluetooth: hci0: command 0x0419 tx timeout 2023/11/22 06:22:50 executed programs: 3 [ 84.425938][ T5418] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 90.694688][ T5418] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888111398b00 (size 240): comm "syz-executor.0", pid 5403, jiffies 4294945022 (age 12.850s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 70 25 13 81 88 ff ff 00 00 00 00 00 00 00 00 .p%............. backtrace: [] kmem_cache_alloc_node+0x2c7/0x450 [] __alloc_skb+0x1ef/0x230 [] sctp_packet_transmit+0xa7/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x500 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xabd/0xad0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] __sock_sendmsg+0x52/0xa0 [] __sys_sendto+0x17e/0x200 BUG: memory leak unreferenced object 0xffff88810bda0780 (size 640): comm "syz-executor.0", pid 5403, jiffies 4294945022 (age 12.850s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmem_cache_alloc_node+0x2c7/0x450 [] kmalloc_reserve+0xe2/0x170 [] __alloc_skb+0xd5/0x230 [] sctp_packet_transmit+0xa7/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x500 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xabd/0xad0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] __sock_sendmsg+0x52/0xa0 BUG: memory leak unreferenced object 0xffff888111398a00 (size 240): comm "syz-executor.0", pid 5403, jiffies 4294945022 (age 12.850s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmem_cache_alloc_node+0x2c7/0x450 [] __alloc_skb+0x1ef/0x230 [] sctp_packet_transmit+0x448/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x500 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xabd/0xad0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] __sock_sendmsg+0x52/0xa0 [] __sys_sendto+0x17e/0x200