[ 48.360401][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.368565][ T26] device veth1_macvtap left promiscuous mode [ 48.374556][ T26] device veth0_macvtap left promiscuous mode [ 48.380724][ T26] device veth1_vlan left promiscuous mode [ 48.386879][ T26] device veth0_vlan left promiscuous mode [ 48.411161][ T26] team0 (unregistering): Port device team_slave_1 removed [ 48.419222][ T26] team0 (unregistering): Port device team_slave_0 removed [ 48.427497][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 48.437112][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 48.450940][ T26] bond0 (unregistering): Released all slaves Warning: Permanently added '10.128.15.192' (ECDSA) to the list of known hosts. 2022/10/05 21:16:02 ignoring optional flag "sandboxArg"="0" 2022/10/05 21:16:02 parsed 1 programs 2022/10/05 21:16:10 executed programs: 0 [ 69.986291][ T44] cfg80211: failed to load regulatory.db 2022/10/05 21:16:13 result: hanged=false err=executor 0: failed to write control pipe: write |1: broken pipe wrong response packet (errno 16) loop exited with status 67 [ 72.696151][ T3611] Bluetooth: hci0: Opcode 0x c03 failed: -110 2022/10/05 21:16:19 executed programs: 1 2022/10/05 21:16:22 result: hanged=false err=executor 0: exit status 67 wrong response packet (errno 16) loop exited with status 67 wrong response packet (errno 16) loop exited with status 67 [ 81.426131][ T3611] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 82.457143][ T46] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 82.464252][ T3613] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 82.472588][ T3613] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 82.480235][ T3613] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 82.487440][ T3613] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 82.494535][ T3613] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 82.501981][ T4083] Bluetooth: hci0: HCI_REQ-0x0c1a [ 82.533497][ T4083] chnl_net:caif_netlink_parms(): no params data found [ 82.551844][ T4083] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.558934][ T4083] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.566881][ T4083] device bridge_slave_0 entered promiscuous mode [ 82.573944][ T4083] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.581285][ T4083] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.588948][ T4083] device bridge_slave_1 entered promiscuous mode [ 82.599929][ T4083] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.610326][ T4083] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.624402][ T4083] team0: Port device team_slave_0 added [ 82.630860][ T4083] team0: Port device team_slave_1 added [ 82.640473][ T4083] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 82.647653][ T4083] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.673770][ T4083] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 82.684849][ T4083] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.691903][ T4083] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.719496][ T4083] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 82.735486][ T4083] device hsr_slave_0 entered promiscuous mode [ 82.742219][ T4083] device hsr_slave_1 entered promiscuous mode [ 82.766573][ T4083] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.773616][ T4083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.780872][ T4083] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.787918][ T4083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.806604][ T4083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.815315][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.823288][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.831550][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.839301][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 82.848641][ T4083] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.857085][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.865269][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.872331][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.881054][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.889340][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.896403][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.910962][ T4083] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 82.921802][ T4083] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 82.934071][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.942680][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.951267][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.959742][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.971200][ T4083] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.979657][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 82.987681][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 82.995442][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.003538][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.057228][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 83.067202][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.075255][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.083480][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.091783][ T4083] device veth0_vlan entered promiscuous mode [ 83.099557][ T4083] device veth1_vlan entered promiscuous mode [ 83.109271][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 83.117229][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 83.124970][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 83.134216][ T4083] device veth0_macvtap entered promiscuous mode [ 83.141707][ T4083] device veth1_macvtap entered promiscuous mode [ 83.151115][ T4083] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 83.158653][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 83.167372][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 83.176641][ T4083] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 83.186547][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 83.211195][ T4103] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 84.536249][ T3611] Bluetooth: hci0: command 0x0409 tx timeout [ 86.616152][ T3611] Bluetooth: hci0: command 0x041b tx timeout [ 88.696117][ T3613] Bluetooth: hci0: command 0x040f tx timeout 2022/10/05 21:16:29 executed programs: 3 [ 90.776133][ T3613] Bluetooth: hci0: command 0x0419 tx timeout 2022/10/05 21:16:35 executed programs: 5 2022/10/05 21:16:41 executed programs: 7 2022/10/05 21:16:47 executed programs: 9 [ 107.803280][ T4128] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 114.384761][ T4128] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888105405300 (size 240): comm "sshd", pid 3874, jiffies 4294942777 (age 59.240s) hex dump (first 32 bytes): e0 ec 3b 15 81 88 ff ff e0 ec 3b 15 81 88 ff ff ..;.......;..... 00 40 37 16 81 88 ff ff 00 00 00 00 00 00 00 00 .@7............. backtrace: [] __alloc_skb+0x1f9/0x270 [] __tcp_send_ack.part.0+0x3a/0x1d0 [] tcp_send_ack+0x32/0x40 [] __tcp_cleanup_rbuf+0x15d/0x1b0 [] tcp_recvmsg_locked+0x3c5/0xfc0 [] tcp_recvmsg+0x9a/0x320 [] inet_recvmsg+0x78/0x180 [] sock_read_iter+0x15f/0x1b0 [] vfs_read+0x3b1/0x400 [] ksys_read+0x12b/0x160 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105405200 (size 240): comm "sshd", pid 3874, jiffies 4294942777 (age 59.240s) hex dump (first 32 bytes): e0 14 33 17 81 88 ff ff e0 14 33 17 81 88 ff ff ..3.......3..... 00 80 e4 16 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] __alloc_skb+0x1f9/0x270 [] __tcp_send_ack.part.0+0x3a/0x1d0 [] tcp_send_ack+0x32/0x40 [] __tcp_cleanup_rbuf+0x15d/0x1b0 [] tcp_recvmsg_locked+0x3c5/0xfc0 [] tcp_recvmsg+0x9a/0x320 [] inet_recvmsg+0x78/0x180 [] sock_read_iter+0x15f/0x1b0 [] vfs_read+0x3b1/0x400 [] ksys_read+0x12b/0x160 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd