Warning: Permanently added '10.128.1.36' (ECDSA) to the list of known hosts. 2022/12/23 07:11:22 ignoring optional flag "sandboxArg"="0" 2022/12/23 07:11:22 parsed 1 programs [ 75.068433][ T31] cfg80211: failed to load regulatory.db 2022/12/23 07:11:30 executed programs: 0 [ 82.029578][ T4380] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 82.036938][ T4380] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 82.044377][ T4380] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 82.051951][ T45] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 82.059235][ T4380] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 82.066456][ T4380] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 82.117732][ T5521] chnl_net:caif_netlink_parms(): no params data found [ 82.145962][ T5521] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.153368][ T5521] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.161729][ T5521] device bridge_slave_0 entered promiscuous mode [ 82.169360][ T5521] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.176588][ T5521] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.189857][ T5521] device bridge_slave_1 entered promiscuous mode [ 82.205087][ T5521] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.215998][ T5521] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.232896][ T5521] team0: Port device team_slave_0 added [ 82.239832][ T5521] team0: Port device team_slave_1 added [ 82.253182][ T5521] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 82.261350][ T5521] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.288302][ T5521] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 82.300204][ T5521] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.307474][ T5521] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.340415][ T5521] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 82.361271][ T5521] device hsr_slave_0 entered promiscuous mode [ 82.368655][ T5521] device hsr_slave_1 entered promiscuous mode [ 82.409789][ T5521] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.417758][ T5521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.426026][ T5521] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.434657][ T5521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.462017][ T5521] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.475470][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.485546][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.494688][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.505547][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 82.517130][ T5521] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.526735][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.536220][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.544394][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.554098][ T5068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.563475][ T5068] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.571373][ T5068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.590303][ T5068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.599995][ T5068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.609818][ T5068] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.618932][ T5521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 82.634307][ T5521] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.643963][ T5068] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 82.652328][ T5068] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 82.769068][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 82.777920][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.787325][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.795362][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.803792][ T5521] device veth0_vlan entered promiscuous mode [ 82.813303][ T5521] device veth1_vlan entered promiscuous mode [ 82.825928][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 82.834856][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 82.845025][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 82.856526][ T5521] device veth0_macvtap entered promiscuous mode [ 82.865495][ T5521] device veth1_macvtap entered promiscuous mode [ 82.876742][ T5521] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 82.884737][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 82.894249][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 82.903984][ T5521] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 82.912042][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 82.942119][ T43] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.952246][ T43] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.960211][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 82.974323][ T43] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.983189][ T43] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.992176][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 84.118217][ T5060] Bluetooth: hci0: command 0x0409 tx timeout [ 85.096215][ C1] vcan0: j1939_tp_rxtimer: 0xffff888113d74200: rx timeout, send abort [ 85.605552][ C1] vcan0: j1939_tp_rxtimer: 0xffff888113d74200: abort rx timeout. Force session deactivation [ 86.188233][ T5060] Bluetooth: hci0: command 0x041b tx timeout [ 88.268439][ T5060] Bluetooth: hci0: command 0x040f tx timeout 2022/12/23 07:11:39 executed programs: 1 [ 90.348209][ T5060] Bluetooth: hci0: command 0x0419 tx timeout [ 90.882375][ C1] vcan0: j1939_xtp_rx_dat: no tx connection found [ 91.712731][ C1] vcan0: j1939_xtp_rx_dat: no tx connection found [ 92.120387][ C1] vcan0: j1939_tp_rxtimer: 0xffff888113d4d000: rx timeout, send abort [ 92.470098][ C1] vcan0: j1939_tp_rxtimer: 0xffff888113e08a00: rx timeout, send abort [ 92.629058][ C1] vcan0: j1939_tp_rxtimer: 0xffff888113d4d000: abort rx timeout. Force session deactivation [ 92.978510][ C1] vcan0: j1939_tp_rxtimer: 0xffff888113e08a00: abort rx timeout. Force session deactivation [ 97.900822][ T5554] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888113e1f800 (size 512): comm "syz-executor.0", pid 5553, jiffies 4294946349 (age 9.740s) hex dump (first 32 bytes): 00 20 fe 12 81 88 ff ff 08 f8 e1 13 81 88 ff ff . .............. 08 f8 e1 13 81 88 ff ff 18 f8 e1 13 81 88 ff ff ................ backtrace: [] kmalloc_trace+0x20/0x90 [] j1939_session_new+0x5b/0x160 [] j1939_tp_send+0x150/0x350 [] j1939_sk_sendmsg+0x4a4/0x810 [] sock_sendmsg+0x56/0x80 [] sock_no_sendpage+0x8f/0xc0 [] kernel_sendpage+0xcd/0x2b0 [] sock_sendpage+0x40/0x50 [] pipe_to_sendpage+0xa2/0x110 [] __splice_from_pipe+0x1ed/0x330 [] generic_splice_sendpage+0x6f/0xa0 [] direct_splice_actor+0x4b/0x70 [] splice_direct_to_actor+0x149/0x350 [] do_splice_direct+0xe8/0x150 [] do_sendfile+0x57f/0x7e0 [] __x64_sys_sendfile64+0xe2/0x100 BUG: memory leak unreferenced object 0xffff888113e44800 (size 240): comm "syz-executor.0", pid 5553, jiffies 4294946350 (age 9.730s) hex dump (first 32 bytes): 00 49 e4 13 81 88 ff ff 68 f8 e1 13 81 88 ff ff .I......h....... 00 00 1d 14 81 88 ff ff 00 3c b2 0a 81 88 ff ff .........<...... backtrace: [] __alloc_skb+0x202/0x270 [] alloc_skb_with_frags+0x6a/0x340 [] sock_alloc_send_pskb+0x39f/0x3d0 [] j1939_sk_sendmsg+0x2d2/0x810 [] sock_sendmsg+0x56/0x80 [] sock_no_sendpage+0x8f/0xc0 [] kernel_sendpage+0xcd/0x2b0 [] sock_sendpage+0x40/0x50 [] pipe_to_sendpage+0xa2/0x110 [] __splice_from_pipe+0x1ed/0x330 [] generic_splice_sendpage+0x6f/0xa0 [] direct_splice_actor+0x4b/0x70 [] splice_direct_to_actor+0x149/0x350 [] do_splice_direct+0xe8/0x150 [] do_sendfile+0x57f/0x7e0 [] __x64_sys_sendfile64+0xe2/0x100 BUG: memory leak unreferenced object 0xffff888113e44900 (size 240): comm "syz-executor.0", pid 5553, jiffies 4294946350 (age 9.730s) hex dump (first 32 bytes): 68 f8 e1 13 81 88 ff ff 00 48 e4 13 81 88 ff ff h........H...... 00 00 1d 14 81 88 ff ff 00 3c b2 0a 81 88 ff ff .........<...... backtrace: [] __alloc_skb+0x202/0x270 [] alloc_skb_with_frags+0x6a/0x340 [] sock_alloc_send_pskb+0x39f/0x3d0 [] j1939_sk_sendmsg+0x2d2/0x810 [] sock_sendmsg+0x56/0x80 [] sock_no_sendpage+0x8f/0xc0 [] kernel_sendpage+0xcd/0x2b0 [] sock_sendpage+0x40/0x50 [] pipe_to_sendpage+0xa2/0x110 [] __splice_from_pipe+0x1ed/0x330 [] generic_splice_sendpage+0x6f/0xa0 [] direct_splice_actor+0x4b/0x70 [] splice_direct_to_actor+0x149/0x350 [] do_splice_direct+0xe8/0x150 [] do_sendfile+0x57f/0x7e0 [] __x64_sys_sendfile64+0xe2/0x100