Warning: Permanently added '10.128.10.21' (ED25519) to the list of known hosts. 2023/11/25 02:23:46 ignoring optional flag "sandboxArg"="0" 2023/11/25 02:23:46 parsed 1 programs 2023/11/25 02:23:54 executed programs: 0 [ 68.790447][ T5370] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 68.829199][ T4449] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 68.836380][ T4449] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 68.843510][ T4449] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 68.850871][ T4449] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 68.858137][ T4449] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 68.865201][ T4449] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 68.943706][ T5395] chnl_net:caif_netlink_parms(): no params data found [ 68.979827][ T5395] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.986967][ T5395] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.994041][ T5395] bridge_slave_0: entered allmulticast mode [ 69.000669][ T5395] bridge_slave_0: entered promiscuous mode [ 69.007688][ T5395] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.014788][ T5395] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.021931][ T5395] bridge_slave_1: entered allmulticast mode [ 69.028391][ T5395] bridge_slave_1: entered promiscuous mode [ 69.045784][ T5395] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.056149][ T5395] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.075579][ T5395] team0: Port device team_slave_0 added [ 69.082246][ T5395] team0: Port device team_slave_1 added [ 69.098165][ T5395] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.105109][ T5395] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.131033][ T5395] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.142406][ T5395] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.149445][ T5395] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.175547][ T5395] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.201720][ T5395] hsr_slave_0: entered promiscuous mode [ 69.207680][ T5395] hsr_slave_1: entered promiscuous mode [ 69.538685][ T5395] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 69.549167][ T5395] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 69.558627][ T5395] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 69.567857][ T5395] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 69.590011][ T5395] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.597169][ T5395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.604519][ T5395] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.611653][ T5395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.668370][ T5395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.682728][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.691375][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.704416][ T5395] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.716650][ T2512] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.723772][ T2512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.741914][ T2512] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.749079][ T2512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.847977][ T5395] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.882407][ T5395] veth0_vlan: entered promiscuous mode [ 69.893260][ T5395] veth1_vlan: entered promiscuous mode [ 69.920578][ T5395] veth0_macvtap: entered promiscuous mode [ 69.930088][ T5395] veth1_macvtap: entered promiscuous mode [ 69.948835][ T5395] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 69.961083][ T5395] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 69.974696][ T5395] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.984079][ T5395] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.993418][ T5395] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.002929][ T5395] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.051969][ T2448] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 70.062147][ T2448] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 70.086164][ T53] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 70.093997][ T53] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 70.137121][ T773] cfg80211: failed to load regulatory.db [ 70.139012][ T1217] ieee802154 phy0 wpan0: encryption failed: -22 [ 70.149090][ T1217] ieee802154 phy1 wpan1: encryption failed: -22 [ 70.924967][ T4449] Bluetooth: hci0: command 0x0409 tx timeout [ 73.004904][ T4449] Bluetooth: hci0: command 0x041b tx timeout [ 75.084912][ T4449] Bluetooth: hci0: command 0x040f tx timeout 2023/11/25 02:24:00 executed programs: 1 [ 76.605173][ T5756] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 77.164925][ T4449] Bluetooth: hci0: command 0x0419 tx timeout [ 81.569642][ T5756] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810e734240 (size 192): comm "syz-executor.0", pid 5395, jiffies 4294944255 (age 13.500s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmem_cache_alloc+0x298/0x430 [] prepare_creds+0x2b/0x4e0 [] copy_creds+0x44/0x280 [] copy_process+0x6aa/0x25c0 [] kernel_clone+0x11b/0x690 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0x3f/0x110 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff888107842440 (size 16): comm "syz-executor.0", pid 5395, jiffies 4294944255 (age 13.500s) hex dump (first 16 bytes): 00 00 00 00 00 00 00 00 00 23 04 40 81 88 ff ff .........#.@.... backtrace: [] __kmem_cache_alloc_node+0x2dd/0x3f0 [] __kmalloc+0x4b/0x150 [] security_prepare_creds+0x121/0x140 [] prepare_creds+0x329/0x4e0 [] copy_creds+0x44/0x280 [] copy_process+0x6aa/0x25c0 [] kernel_clone+0x11b/0x690 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0x3f/0x110 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810d6650c0 (size 192): comm "syz-executor.0", pid 5395, jiffies 4294944791 (age 8.150s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmem_cache_alloc+0x298/0x430 [] prepare_creds+0x2b/0x4e0 [] copy_creds+0x44/0x280 [] copy_process+0x6aa/0x25c0 [] kernel_clone+0x11b/0x690 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0x3f/0x110 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff888104225240 (size 16): comm "syz-executor.0", pid 5395, jiffies 4294944791 (age 8.150s) hex dump (first 16 bytes): 00 00 00 00 00 00 00 00 00 23 04 40 81 88 ff ff .........#.@.... backtrace: [] __kmem_cache_alloc_node+0x2dd/0x3f0 [] __kmalloc+0x4b/0x150 [] security_prepare_creds+0x121/0x140 [] prepare_creds+0x329/0x4e0 [] copy_creds+0x44/0x280 [] copy_process+0x6aa/0x25c0 [] kernel_clone+0x11b/0x690 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0x3f/0x110 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810a94ccc0 (size 192): comm "syz-executor.0", pid 5395, jiffies 4294944798 (age 8.080s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmem_cache_alloc+0x298/0x430 [] prepare_creds+0x2b/0x4e0 [] copy_creds+0x44/0x280 [] copy_process+0x6aa/0x25c0 [] kernel_clone+0x11b/0x690 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0x3f/0x110 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b