Warning: Permanently added '10.128.0.14' (ECDSA) to the list of known hosts. 2021/07/13 03:59:14 parsed 1 programs 2021/07/13 03:59:22 executed programs: 0 [ 1078.904594][ T8474] chnl_net:caif_netlink_parms(): no params data found [ 1078.925307][ T8474] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.940495][ T8474] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.948206][ T8474] device bridge_slave_0 entered promiscuous mode [ 1078.955708][ T8474] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.962894][ T8474] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.971022][ T8474] device bridge_slave_1 entered promiscuous mode [ 1078.982404][ T8474] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1078.992555][ T8474] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1079.006038][ T8474] team0: Port device team_slave_0 added [ 1079.012374][ T8474] team0: Port device team_slave_1 added [ 1079.021703][ T8474] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1079.029244][ T8474] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1079.055650][ T8474] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1079.067236][ T8474] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1079.075126][ T8474] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1079.102153][ T8474] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1079.118929][ T8474] device hsr_slave_0 entered promiscuous mode [ 1079.125491][ T8474] device hsr_slave_1 entered promiscuous mode [ 1079.162200][ T8474] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1079.170139][ T8474] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1079.178262][ T8474] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1079.186928][ T8474] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1079.198162][ T8474] bridge0: port 2(bridge_slave_1) entered blocking state [ 1079.205470][ T8474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1079.212967][ T8474] bridge0: port 1(bridge_slave_0) entered blocking state [ 1079.220280][ T8474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1079.239678][ T8474] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1079.248655][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1079.256788][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1079.264781][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1079.272944][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1079.282073][ T8474] 8021q: adding VLAN 0 to HW filter on device team0 [ 1079.290912][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1079.299697][ T8614] bridge0: port 1(bridge_slave_0) entered blocking state [ 1079.307302][ T8614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1079.316940][ T8696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1079.325440][ T8696] bridge0: port 2(bridge_slave_1) entered blocking state [ 1079.332880][ T8696] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1079.345282][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1079.357659][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1079.366292][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1079.375489][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1079.384100][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1079.393182][ T8474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1079.404591][ T8696] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1079.412498][ T8696] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1079.422377][ T8474] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1079.433967][ T8696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1079.447206][ T8696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1079.455926][ T8696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1079.464254][ T8696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1079.473025][ T8474] device veth0_vlan entered promiscuous mode [ 1079.482225][ T8474] device veth1_vlan entered promiscuous mode [ 1079.494243][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1079.502350][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1079.510577][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1079.519858][ T8474] device veth0_macvtap entered promiscuous mode [ 1079.528485][ T8474] device veth1_macvtap entered promiscuous mode [ 1079.539394][ T8474] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1079.547972][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1079.556557][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1079.566519][ T8474] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1079.574181][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1079.584562][ T8474] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.593665][ T8474] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.602596][ T8474] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.611593][ T8474] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.643882][ T1364] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1079.652115][ T1364] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1079.663235][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1079.671928][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1079.676974][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1079.686996][ T8695] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1079.706968][ T8718] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 1080.900614][ T8696] Bluetooth: hci0: command 0x0409 tx timeout [ 1082.980345][ T8696] Bluetooth: hci0: command 0x041b tx timeout [ 1085.060255][ T8449] Bluetooth: hci0: command 0x040f tx timeout 2021/07/13 03:59:30 executed programs: 1 [ 1087.140294][ T8449] Bluetooth: hci0: command 0x0419 tx timeout 2021/07/13 03:59:36 executed programs: 3 [ 1093.114233][ T8750] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1099.811602][ T8750] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888101e9cb20 (size 32): comm "syz-executor.0", pid 8728, jiffies 4295045842 (age 14.170s) hex dump (first 32 bytes): 00 90 65 01 00 c9 ff ff 80 ee 80 84 ff ff ff ff ..e............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88810290e740 (size 32): comm "syz-executor.0", pid 8728, jiffies 4295045842 (age 14.170s) hex dump (first 32 bytes): 00 90 65 01 00 c9 ff ff 00 ef 80 84 ff ff ff ff ..e............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88810290ebe0 (size 32): comm "syz-executor.0", pid 8728, jiffies 4295045842 (age 14.170s) hex dump (first 32 bytes): 00 90 65 01 00 c9 ff ff 40 ef 80 84 ff ff ff ff ..e.....@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888102a93560 (size 32): comm "syz-executor.0", pid 8728, jiffies 4295045842 (age 14.170s) hex dump (first 32 bytes): 00 90 65 01 00 c9 ff ff 80 ef 80 84 ff ff ff ff ..e............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888102a932e0 (size 32): comm "syz-executor.0", pid 8728, jiffies 4295045842 (age 14.170s) hex dump (first 32 bytes): 00 90 65 01 00 c9 ff ff c0 ef 80 84 ff ff ff ff ..e............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101e9ce60 (size 32): comm "syz-executor.0", pid 8728, jiffies 4295045842 (age 14.170s) hex dump (first 32 bytes): 00 90 65 01 00 c9 ff ff 00 f0 80 84 ff ff ff ff ..e............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888102a93920 (size 32): comm "syz-executor.0", pid 8728, jiffies 4295045842 (age 14.170s) hex dump (first 32 bytes): 00 90 65 01 00 c9 ff ff 40 f0 80 84 ff ff ff ff ..e.....@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae