Warning: Permanently added '10.128.0.41' (ECDSA) to the list of known hosts. executing program [ 53.619347][ T3691] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 53.979330][ T3691] usb 1-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=32.33 [ 53.988378][ T3691] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 53.997236][ T3691] usb 1-1: config 0 descriptor?? [ 54.259402][ T3691] usb 1-1: atusb_control_msg: req 0x10 val 0x0 idx 0x0, error -71 [ 54.267238][ T3691] usb 1-1: Firmware version (0.0) predates our first public release. [ 54.278739][ T3691] usb 1-1: Please update to version 0.2 or newer [ 54.286524][ T3691] usb 1-1: atusb_probe: initialization failed, error = -71 [ 54.295030][ T3691] atusb: probe of 1-1:0.0 failed with error -71 [ 54.302418][ T3691] usb 1-1: USB disconnect, device number 2 executing program [ 59.758732][ T3691] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 60.138911][ T3691] usb 1-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=32.33 [ 60.148131][ T3691] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 60.156890][ T3691] usb 1-1: config 0 descriptor?? [ 60.418699][ T3691] usb 1-1: atusb_control_msg: req 0x10 val 0x0 idx 0x0, error -71 [ 60.426527][ T3691] usb 1-1: Firmware version (0.0) predates our first public release. [ 60.448667][ T3691] usb 1-1: Please update to version 0.2 or newer [ 60.455020][ T3691] usb 1-1: atusb_probe: initialization failed, error = -71 [ 60.464700][ T3691] atusb: probe of 1-1:0.0 failed with error -71 [ 60.472171][ T3691] usb 1-1: USB disconnect, device number 3 [ 61.504437][ T8482] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 67.746074][ T8482] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810fe5a180 (size 192): comm "kworker/0:2", pid 3691, jiffies 4294942676 (age 13.770s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 98 a1 e5 0f 81 88 ff ff ................ backtrace: [<00000000fd27d26d>] usb_alloc_urb+0x66/0xe0 [<00000000f41f1372>] atusb_probe+0x158/0x820 [<0000000004e36010>] usb_probe_interface+0x177/0x370 [<000000002497bce0>] really_probe+0x159/0x480 [<000000000ddecbd8>] driver_probe_device+0x84/0x100 [<00000000f290d156>] __device_attach_driver+0xee/0x110 [<000000000901d2be>] bus_for_each_drv+0xb7/0x100 [<0000000056c3efe2>] __device_attach+0x122/0x250 [<0000000048bbe83b>] bus_probe_device+0xc6/0xe0 [<000000006f64fd99>] device_add+0x5be/0xc30 [<00000000a1782785>] usb_set_configuration+0x9d9/0xb90 [<000000001353d9d0>] usb_generic_driver_probe+0x8c/0xc0 [<0000000050fe4ec8>] usb_probe_device+0x5c/0x140 [<000000002497bce0>] really_probe+0x159/0x480 [<000000000ddecbd8>] driver_probe_device+0x84/0x100 [<00000000f290d156>] __device_attach_driver+0xee/0x110 BUG: memory leak unreferenced object 0xffff88810a93e300 (size 192): comm "kworker/0:2", pid 3691, jiffies 4294942676 (age 13.770s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 18 e3 93 0a 81 88 ff ff ................ backtrace: [<00000000fd27d26d>] usb_alloc_urb+0x66/0xe0 [<00000000f41f1372>] atusb_probe+0x158/0x820 [<0000000004e36010>] usb_probe_interface+0x177/0x370 [<000000002497bce0>] really_probe+0x159/0x480 [<000000000ddecbd8>] driver_probe_device+0x84/0x100 [<00000000f290d156>] __device_attach_driver+0xee/0x110 [<000000000901d2be>] bus_for_each_drv+0xb7/0x100 [<0000000056c3efe2>] __device_attach+0x122/0x250 [<0000000048bbe83b>] bus_probe_device+0xc6/0xe0 [<000000006f64fd99>] device_add+0x5be/0xc30 [<00000000a1782785>] usb_set_configuration+0x9d9/0xb90 [<000000001353d9d0>] usb_generic_driver_probe+0x8c/0xc0 [<0000000050fe4ec8>] usb_probe_device+0x5c/0x140 [<000000002497bce0>] really_probe+0x159/0x480 [<000000000ddecbd8>] driver_probe_device+0x84/0x100 [<00000000f290d156>] __device_attach_driver+0xee/0x110 BUG: memory leak unreferenced object 0xffff88810fe5a240 (size 192): comm "kworker/0:2", pid 3691, jiffies 4294942676 (age 13.770s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 58 a2 e5 0f 81 88 ff ff ........X....... backtrace: [<00000000fd27d26d>] usb_alloc_urb+0x66/0xe0 [<00000000f41f1372>] atusb_probe+0x158/0x820 [<0000000004e36010>] usb_probe_interface+0x177/0x370 [<000000002497bce0>] really_probe+0x159/0x480 [<000000000ddecbd8>] driver_probe_device+0x84/0x100 [<00000000f290d156>] __device_attach_driver+0xee/0x110 [<000000000901d2be>] bus_for_each_drv+0xb7/0x100 [<0000000056c3efe2>] __device_attach+0x122/0x250 [<0000000048bbe83b>] bus_probe_device+0xc6/0xe0 [<000000006f64fd99>] device_add+0x5be/0xc30 [<00000000a1782785>] usb_set_configuration+0x9d9/0xb90 [<000000001353d9d0>] usb_generic_driver_probe+0x8c/0xc0 [<0000000050fe4ec8>] usb_probe_device+0x5c/0x140 [<000000002497bce0>] really_probe+0x159/0x480 [<000000000ddecbd8>] driver_probe_device+0x84/0x100 [<00000000f290d156>] __device_attach_driver+0xee/0x110