Warning: Permanently added '10.128.0.225' (ED25519) to the list of known hosts. 2023/09/05 19:23:23 ignoring optional flag "sandboxArg"="0" 2023/09/05 19:23:23 parsed 1 programs [ 64.484292][ T5360] cgroup: Unknown subsys name 'net' [ 64.492058][ T5360] cgroup: Unknown subsys name 'rlimit' [ 70.160084][ T774] cfg80211: failed to load regulatory.db 2023/09/05 19:23:30 executed programs: 0 [ 71.268490][ T5333] syz-execprog[5333]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 71.278268][ T5333] syz-execprog[5333]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 74.398270][ T5025] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 76.480390][ T4431] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 76.487699][ T4431] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 76.494781][ T4431] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 76.502149][ T4431] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 76.509355][ T4431] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 76.516581][ T4431] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 76.587757][ T5372] chnl_net:caif_netlink_parms(): no params data found [ 76.624218][ T5372] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.631595][ T5372] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.638887][ T5372] bridge_slave_0: entered allmulticast mode [ 76.645373][ T5372] bridge_slave_0: entered promiscuous mode [ 76.652516][ T5372] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.660414][ T5372] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.667503][ T5372] bridge_slave_1: entered allmulticast mode [ 76.673961][ T5372] bridge_slave_1: entered promiscuous mode [ 76.690759][ T5372] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.701048][ T5372] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.720792][ T5372] team0: Port device team_slave_0 added [ 76.727554][ T5372] team0: Port device team_slave_1 added [ 76.743564][ T5372] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 76.750608][ T5372] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.776676][ T5372] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 76.788180][ T5372] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 76.795126][ T5372] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.821264][ T5372] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 76.844552][ T5372] hsr_slave_0: entered promiscuous mode [ 76.850505][ T5372] hsr_slave_1: entered promiscuous mode [ 76.902557][ T5372] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.909755][ T5372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.917062][ T5372] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.924140][ T5372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.955857][ T5372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.967591][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.975004][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.986058][ T5372] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.995691][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.002832][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.019081][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.026163][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.044064][ T5372] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 77.054794][ T5372] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 77.076924][ T5372] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.171870][ T5372] veth0_vlan: entered promiscuous mode [ 77.180575][ T5372] veth1_vlan: entered promiscuous mode [ 77.197455][ T5372] veth0_macvtap: entered promiscuous mode [ 77.206527][ T5372] veth1_macvtap: entered promiscuous mode [ 77.220008][ T5372] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 77.230915][ T5372] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.263773][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.275299][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.290658][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.298949][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.333872][ T5392] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.0'. [ 78.558267][ T4431] Bluetooth: hci0: command 0x0409 tx timeout [ 80.638266][ T4431] Bluetooth: hci0: command 0x041b tx timeout 2023/09/05 19:23:41 executed programs: 1 [ 82.718246][ T4431] Bluetooth: hci0: command 0x040f tx timeout [ 84.798247][ T4431] Bluetooth: hci0: command 0x0419 tx timeout [ 88.525327][ T5404] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 90.568048][ T5404] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888112c6cf00 (size 240): comm "syz-executor.0", pid 5401, jiffies 4294945492 (age 8.090s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 70 e2 0d 81 88 ff ff 00 00 00 00 00 00 00 00 .p.............. backtrace: [] __alloc_skb+0x1ef/0x230 [] sctp_packet_transmit+0xa7/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x510 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xaad/0xac0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] sock_sendmsg+0x56/0xb0 [] __sys_sendto+0x17e/0x200 [] __x64_sys_sendto+0x28/0x30 BUG: memory leak unreferenced object 0xffff88810ca55680 (size 640): comm "syz-executor.0", pid 5401, jiffies 4294945492 (age 8.090s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc_reserve+0xe1/0x180 [] __alloc_skb+0xd5/0x230 [] sctp_packet_transmit+0xa7/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x510 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xaad/0xac0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] sock_sendmsg+0x56/0xb0 [] __sys_sendto+0x17e/0x200 BUG: memory leak unreferenced object 0xffff888112eeff00 (size 240): comm "syz-executor.0", pid 5401, jiffies 4294945492 (age 8.090s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0x1ef/0x230 [] sctp_packet_transmit+0x448/0xd00 [] sctp_outq_flush+0x4ff/0x1050 [] sctp_do_sm+0xd06/0x2440 [] sctp_assoc_bh_rcv+0x1e7/0x2f0 [] sctp_inq_push+0x96/0xc0 [] sctp_backlog_rcv+0x93/0x510 [] __release_sock+0xbd/0x140 [] release_sock+0x36/0xd0 [] sctp_wait_for_connect+0xd3/0x270 [] sctp_sendmsg_to_asoc+0xaad/0xac0 [] sctp_sendmsg+0x89a/0x10a0 [] inet_sendmsg+0x49/0x70 [] sock_sendmsg+0x56/0xb0 [] __sys_sendto+0x17e/0x200 [] __x64_sys_sendto+0x28/0x30