Warning: Permanently added '10.128.0.6' (ECDSA) to the list of known hosts. 2022/10/04 05:43:14 ignoring optional flag "sandboxArg"="0" 2022/10/04 05:43:14 parsed 1 programs [ 787.914346][ T3646] cgroup: Unknown subsys name 'net' [ 788.036790][ T3646] cgroup: Unknown subsys name 'rlimit' 2022/10/04 05:43:22 executed programs: 0 [ 795.466800][ T3646] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 796.585728][ T3656] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 796.592755][ T3656] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 796.599828][ T3656] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 796.606978][ T3656] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 796.613967][ T3656] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 796.620950][ T3656] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 796.653558][ T3654] chnl_net:caif_netlink_parms(): no params data found [ 796.670489][ T3654] bridge0: port 1(bridge_slave_0) entered blocking state [ 796.677595][ T3654] bridge0: port 1(bridge_slave_0) entered disabled state [ 796.684984][ T3654] device bridge_slave_0 entered promiscuous mode [ 796.691795][ T3654] bridge0: port 2(bridge_slave_1) entered blocking state [ 796.698965][ T3654] bridge0: port 2(bridge_slave_1) entered disabled state [ 796.706254][ T3654] device bridge_slave_1 entered promiscuous mode [ 796.716337][ T3654] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 796.725966][ T3654] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 796.738433][ T3654] team0: Port device team_slave_0 added [ 796.744431][ T3654] team0: Port device team_slave_1 added [ 796.753357][ T3654] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 796.760340][ T3654] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 796.786371][ T3654] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 796.797358][ T3654] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 796.804272][ T3654] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 796.830215][ T3654] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 796.846966][ T3654] device hsr_slave_0 entered promiscuous mode [ 796.853152][ T3654] device hsr_slave_1 entered promiscuous mode [ 796.878773][ T3654] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 796.886117][ T3654] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 796.893394][ T3654] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 796.900874][ T3654] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 796.911583][ T3654] bridge0: port 2(bridge_slave_1) entered blocking state [ 796.918620][ T3654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 796.925829][ T3654] bridge0: port 1(bridge_slave_0) entered blocking state [ 796.933186][ T3654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 796.950614][ T3654] 8021q: adding VLAN 0 to HW filter on device bond0 [ 796.959041][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 796.966966][ T140] bridge0: port 1(bridge_slave_0) entered disabled state [ 796.974256][ T140] bridge0: port 2(bridge_slave_1) entered disabled state [ 796.981884][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 796.990343][ T3654] 8021q: adding VLAN 0 to HW filter on device team0 [ 796.998234][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 797.006396][ T143] bridge0: port 1(bridge_slave_0) entered blocking state [ 797.013408][ T143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 797.021831][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 797.029960][ T3335] bridge0: port 2(bridge_slave_1) entered blocking state [ 797.036997][ T3335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 797.047306][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 797.055425][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 797.065985][ T3654] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 797.076517][ T3654] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 797.087542][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 797.095601][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 797.103503][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 797.111537][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 797.136759][ T3654] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 797.144893][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 797.152207][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 797.161547][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 797.173346][ T3654] device veth0_vlan entered promiscuous mode [ 797.180248][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 797.188390][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 797.195896][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 797.204265][ T3654] device veth1_vlan entered promiscuous mode [ 797.213467][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 797.221175][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 797.228984][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 797.237810][ T3654] device veth0_macvtap entered promiscuous mode [ 797.244937][ T3654] device veth1_macvtap entered promiscuous mode [ 797.253926][ T3654] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 797.261262][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 797.269879][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 797.278818][ T3654] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 797.286098][ T3335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 797.294988][ T3654] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 797.303650][ T3654] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 797.312437][ T3654] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 797.321349][ T3654] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 797.347598][ T3673] loop0: detected capacity change from 0 to 32768 [ 797.355690][ T3673] read_mapping_page failed! [ 797.360236][ T3673] ERROR: (device loop0): txAbort: [ 797.360236][ T3673] [ 797.367814][ T3673] ERROR: (device loop0): remounting filesystem as read-only [ 797.375269][ T3673] ======================================================= [ 797.375269][ T3673] WARNING: The mand mount option has been deprecated and [ 797.375269][ T3673] and is ignored by this kernel. Remove the mand [ 797.375269][ T3673] option from the mount to silence this warning. [ 797.375269][ T3673] ======================================================= [ 798.665456][ T3335] Bluetooth: hci0: command 0x0409 tx timeout [ 800.744748][ T3335] Bluetooth: hci0: command 0x041b tx timeout [ 802.026380][ T1234] ieee802154 phy0 wpan0: encryption failed: -22 [ 802.032662][ T1234] ieee802154 phy1 wpan1: encryption failed: -22 2022/10/04 05:43:29 executed programs: 1 [ 802.635215][ T3676] loop0: detected capacity change from 0 to 32768 [ 802.642961][ T3676] read_mapping_page failed! [ 802.647798][ T3676] ERROR: (device loop0): txAbort: [ 802.647798][ T3676] [ 802.655247][ T3676] ERROR: (device loop0): remounting filesystem as read-only [ 802.676658][ T3678] loop0: detected capacity change from 0 to 32768 [ 802.684504][ T3678] read_mapping_page failed! [ 802.689092][ T3678] ERROR: (device loop0): txAbort: [ 802.689092][ T3678] [ 802.696509][ T3678] ERROR: (device loop0): remounting filesystem as read-only [ 802.824757][ T3647] Bluetooth: hci0: command 0x040f tx timeout [ 803.757409][ T3679] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 804.904753][ T3647] Bluetooth: hci0: command 0x0419 tx timeout [ 809.920994][ T3679] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888114339e80 (size 128): comm "syz-executor.0", pid 3673, jiffies 4295017005 (age 12.610s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 [] __get_metapage+0x38a/0x9b0 [] diNewExt+0x3f2/0x9d0 [] diAllocAG+0x9a4/0xd50 [] diAlloc+0x31f/0x900 [] ialloc+0x6a/0x3a0 [] jfs_mkdir+0xf7/0x480 [] vfs_mkdir+0x223/0x340 [] do_mkdirat+0x1a5/0x1e0 [] __x64_sys_mkdir+0x69/0x90 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888114339e00 (size 128): comm "syz-executor.0", pid 3673, jiffies 4295017005 (age 12.610s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 [] __get_metapage+0x38a/0x9b0 [] diNewExt+0x3f2/0x9d0 [] diAllocAG+0x9a4/0xd50 [] diAlloc+0x31f/0x900 [] ialloc+0x6a/0x3a0 [] jfs_mkdir+0xf7/0x480 [] vfs_mkdir+0x223/0x340 [] do_mkdirat+0x1a5/0x1e0 [] __x64_sys_mkdir+0x69/0x90 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888114339d80 (size 128): comm "syz-executor.0", pid 3673, jiffies 4295017005 (age 12.610s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 [] __get_metapage+0x38a/0x9b0 [] diNewExt+0x3f2/0x9d0 [] diAllocAG+0x9a4/0xd50 [] diAlloc+0x31f/0x900 [] ialloc+0x6a/0x3a0 [] jfs_mkdir+0xf7/0x480 [] vfs_mkdir+0x223/0x340 [] do_mkdirat+0x1a5/0x1e0 [] __x64_sys_mkdir+0x69/0x90 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881142f0300 (size 128): comm "syz-executor.0", pid 3676, jiffies 4295017533 (age 7.330s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 [] __get_metapage+0x38a/0x9b0 [] diNewExt+0x3f2/0x9d0 [] diAllocAG+0x9a4/0xd50 [] diAlloc+0x31f/0x900 [] ialloc+0x6a/0x3a0 [] jfs_mkdir+0xf7/0x480 [] vfs_mkdir+0x223/0x340 [] do_mkdirat+0x1a5/0x1e0 [] __x64_sys_mkdir+0x69/0x90 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd