Warning: Permanently added '10.128.1.110' (ECDSA) to the list of known hosts.
2021/06/15 18:22:06 parsed 1 programs
2021/06/15 18:22:14 executed programs: 0
[ 1077.605590][ T8460] chnl_net:caif_netlink_parms(): no params data found
[ 1077.625181][ T8460] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1077.633214][ T8460] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1077.641532][ T8460] device bridge_slave_0 entered promiscuous mode
[ 1077.649889][ T8460] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1077.657684][ T8460] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1077.665193][ T8460] device bridge_slave_1 entered promiscuous mode
[ 1077.676266][ T8460] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 1077.686431][ T8460] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 1077.699617][ T8460] team0: Port device team_slave_0 added
[ 1077.706099][ T8460] team0: Port device team_slave_1 added
[ 1077.715829][ T8460] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 1077.723091][ T8460] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 1077.750878][ T8460] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 1077.763566][ T8460] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 1077.771376][ T8460] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 1077.798636][ T8460] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 1077.815320][ T8460] device hsr_slave_0 entered promiscuous mode
[ 1077.823791][ T8460] device hsr_slave_1 entered promiscuous mode
[ 1077.854805][ T8460] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 1077.864266][ T8460] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 1077.872274][ T8460] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 1077.880140][ T8460] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 1077.891782][ T8460] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1077.899079][ T8460] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 1077.906684][ T8460] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1077.914966][ T8460] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 1077.933638][ T8460] 8021q: adding VLAN 0 to HW filter on device bond0
[ 1077.942755][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 1077.951554][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1077.960746][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1077.969461][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 1077.978361][ T8460] 8021q: adding VLAN 0 to HW filter on device team0
[ 1077.988356][ T8600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 1077.998319][ T8600] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1078.005651][ T8600] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 1078.019110][ T8600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 1078.027867][ T8600] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1078.035406][ T8600] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 1078.044306][ T8600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 1078.053175][ T8600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 1078.061745][ T8600] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 1078.070724][ T3797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 1078.082075][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 1078.091067][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 1078.102423][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 1078.110446][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 1078.120342][ T8460] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 1078.132795][ T8600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 1078.146504][ T8460] device veth0_vlan entered promiscuous mode
[ 1078.153720][ T3797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 1078.163148][ T3797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 1078.171238][ T3797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 1078.182441][ T8460] device veth1_vlan entered promiscuous mode
[ 1078.197496][ T8460] device veth0_macvtap entered promiscuous mode
[ 1078.204550][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 1078.214897][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 1078.222969][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 1078.231758][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 1078.241098][ T8460] device veth1_macvtap entered promiscuous mode
[ 1078.252700][ T8460] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 1078.260041][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 1078.270822][ T8460] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 1078.279278][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 1078.289189][ T8460] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 1078.299496][ T8460] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 1078.309161][ T8460] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 1078.317866][ T8460] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 1078.349603][   T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 1078.357533][   T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 1078.373436][ T8621] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 1078.379823][    T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 1078.382288][ T8621] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 1078.396957][ T8600] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 1078.413575][ T8704] device vxcan0 entered promiscuous mode
[ 1078.419727][ T8704] device vlan2 entered promiscuous mode
[ 1078.425519][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready
[ 1078.434798][ T8704] device vxcan0 left promiscuous mode
[ 1079.608529][ T3797] Bluetooth: hci0: command 0x0409 tx timeout
[ 1081.688314][ T3797] Bluetooth: hci0: command 0x041b tx timeout
[ 1083.767978][ T3797] Bluetooth: hci0: command 0x040f tx timeout
2021/06/15 18:22:21 executed programs: 1
[ 1084.046583][ T8715] device vxcan0 entered promiscuous mode
[ 1084.052679][ T8715] device vlan2 entered promiscuous mode
[ 1084.058705][ T8715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready
[ 1084.066508][ T8715] device vxcan0 left promiscuous mode
[ 1084.106017][ T8720] device vxcan0 entered promiscuous mode
[ 1084.112219][ T8720] device vlan2 entered promiscuous mode
[ 1084.118200][ T8720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan2: link becomes ready
[ 1084.126117][ T8720] device vxcan0 left promiscuous mode
[ 1085.335281][ T8727] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[ 1085.847804][    T7] Bluetooth: hci0: command 0x0419 tx timeout
[ 1091.820647][ T8727] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff888118b93480 (size 64):
  comm "syz-executor.0", pid 8704, jiffies 4295045113 (age 13.470s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 01 00 00 00 01 02 00 00  ................
  backtrace:
    [<ffffffff83771b93>] mrp_request_join+0x153/0x260
    [<ffffffff83dab406>] vlan_mvrp_request_join+0x96/0xa0
    [<ffffffff83da9a97>] vlan_dev_open+0x1e7/0x330
    [<ffffffff836d6035>] __dev_open+0x175/0x260
    [<ffffffff836d675a>] __dev_change_flags+0x2fa/0x390
    [<ffffffff836e6df4>] rtnl_configure_link+0x64/0x130
    [<ffffffff836ee854>] __rtnl_newlink+0xa74/0xdb0
    [<ffffffff836eebd9>] rtnl_newlink+0x49/0x70
    [<ffffffff836e9dbc>] rtnetlink_rcv_msg+0x1fc/0x520
    [<ffffffff83822277>] netlink_rcv_skb+0x87/0x1d0
    [<ffffffff83821462>] netlink_unicast+0x392/0x4c0
    [<ffffffff838218f8>] netlink_sendmsg+0x368/0x6a0
    [<ffffffff8368f746>] sock_sendmsg+0x56/0x80
    [<ffffffff8368fcac>] ____sys_sendmsg+0x36c/0x390
    [<ffffffff83693cfb>] ___sys_sendmsg+0x8b/0xd0
    [<ffffffff83693df8>] __sys_sendmsg+0x88/0x100

BUG: memory leak
unreferenced object 0xffff888118b935c0 (size 64):
  comm "syz-executor.0", pid 8715, jiffies 4295045676 (age 7.840s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 08 00 00 00 01 02 00 00  ................
  backtrace:
    [<ffffffff83770288>] garp_request_join+0x138/0x220
    [<ffffffff83dab266>] vlan_gvrp_request_join+0x96/0xa0
    [<ffffffff83da9aa9>] vlan_dev_open+0x1f9/0x330
    [<ffffffff836d6035>] __dev_open+0x175/0x260
    [<ffffffff836d675a>] __dev_change_flags+0x2fa/0x390
    [<ffffffff836e6df4>] rtnl_configure_link+0x64/0x130
    [<ffffffff836ee854>] __rtnl_newlink+0xa74/0xdb0
    [<ffffffff836eebd9>] rtnl_newlink+0x49/0x70
    [<ffffffff836e9dbc>] rtnetlink_rcv_msg+0x1fc/0x520
    [<ffffffff83822277>] netlink_rcv_skb+0x87/0x1d0
    [<ffffffff83821462>] netlink_unicast+0x392/0x4c0
    [<ffffffff838218f8>] netlink_sendmsg+0x368/0x6a0
    [<ffffffff8368f746>] sock_sendmsg+0x56/0x80
    [<ffffffff8368fcac>] ____sys_sendmsg+0x36c/0x390
    [<ffffffff83693cfb>] ___sys_sendmsg+0x8b/0xd0
    [<ffffffff83693df8>] __sys_sendmsg+0x88/0x100

BUG: memory leak
unreferenced object 0xffff888118b93300 (size 64):
  comm "syz-executor.0", pid 8715, jiffies 4295045676 (age 7.840s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 01 00 00 00 01 02 00 00  ................
  backtrace:
    [<ffffffff83771b93>] mrp_request_join+0x153/0x260
    [<ffffffff83dab406>] vlan_mvrp_request_join+0x96/0xa0
    [<ffffffff83da9a97>] vlan_dev_open+0x1e7/0x330
    [<ffffffff836d6035>] __dev_open+0x175/0x260
    [<ffffffff836d675a>] __dev_change_flags+0x2fa/0x390
    [<ffffffff836e6df4>] rtnl_configure_link+0x64/0x130
    [<ffffffff836ee854>] __rtnl_newlink+0xa74/0xdb0
    [<ffffffff836eebd9>] rtnl_newlink+0x49/0x70
    [<ffffffff836e9dbc>] rtnetlink_rcv_msg+0x1fc/0x520
    [<ffffffff83822277>] netlink_rcv_skb+0x87/0x1d0
    [<ffffffff83821462>] netlink_unicast+0x392/0x4c0
    [<ffffffff838218f8>] netlink_sendmsg+0x368/0x6a0
    [<ffffffff8368f746>] sock_sendmsg+0x56/0x80
    [<ffffffff8368fcac>] ____sys_sendmsg+0x36c/0x390
    [<ffffffff83693cfb>] ___sys_sendmsg+0x8b/0xd0
    [<ffffffff83693df8>] __sys_sendmsg+0x88/0x100