Warning: Permanently added '10.128.15.196' (ED25519) to the list of known hosts. 2024/01/30 16:29:07 ignoring optional flag "sandboxArg"="0" 2024/01/30 16:29:07 parsed 1 programs 2024/01/30 16:29:14 executed programs: 0 [ 69.295683][ T4435] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.303369][ T4435] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.310651][ T4435] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.318872][ T4435] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.326855][ T4435] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 69.334914][ T4435] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 69.410673][ T5379] chnl_net:caif_netlink_parms(): no params data found [ 69.447206][ T5379] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.454390][ T5379] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.462011][ T5379] bridge_slave_0: entered allmulticast mode [ 69.468763][ T5379] bridge_slave_0: entered promiscuous mode [ 69.475878][ T5379] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.483245][ T5379] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.491159][ T5379] bridge_slave_1: entered allmulticast mode [ 69.497820][ T5379] bridge_slave_1: entered promiscuous mode [ 69.515279][ T5379] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.526093][ T5379] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.545556][ T5379] team0: Port device team_slave_0 added [ 69.552990][ T5379] team0: Port device team_slave_1 added [ 69.568991][ T5379] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.576885][ T5379] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.604687][ T5379] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.616576][ T5379] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.624653][ T5379] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.652051][ T5379] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.680461][ T5379] hsr_slave_0: entered promiscuous mode [ 69.686882][ T5379] hsr_slave_1: entered promiscuous mode [ 69.977982][ T5379] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 69.987985][ T5379] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 69.998152][ T5379] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 70.007503][ T5379] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 70.029346][ T5379] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.037153][ T5379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.044583][ T5379] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.051739][ T5379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.098370][ T5379] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.115172][ T4766] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.123885][ T4766] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.137208][ T5379] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.149203][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.156600][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.172426][ T1230] ieee802154 phy0 wpan0: encryption failed: -22 [ 70.172491][ T775] cfg80211: failed to load regulatory.db [ 70.178710][ T1230] ieee802154 phy1 wpan1: encryption failed: -22 [ 70.204761][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.212128][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.308568][ T5379] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.343868][ T5379] veth0_vlan: entered promiscuous mode [ 70.355228][ T5379] veth1_vlan: entered promiscuous mode [ 70.380558][ T5379] veth0_macvtap: entered promiscuous mode [ 70.390859][ T5379] veth1_macvtap: entered promiscuous mode [ 70.408359][ T5379] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 70.421825][ T5379] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 70.434191][ T5379] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.444789][ T5379] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.454984][ T5379] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.465170][ T5379] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.517310][ T42] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 70.530944][ T42] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 70.551802][ T42] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 70.559843][ T42] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 70.664082][ T5489] block device autoloading is deprecated and will be removed. [ 70.700492][ T5480] md1: using deprecated bitmap file support [ 71.370178][ T5027] Bluetooth: hci0: command 0x0409 tx timeout [ 73.449956][ T5027] Bluetooth: hci0: command 0x041b tx timeout [ 75.529959][ T5027] Bluetooth: hci0: command 0x040f tx timeout 2024/01/30 16:29:21 executed programs: 1 [ 76.646020][ T5739] block device autoloading is deprecated and will be removed. [ 76.680047][ T5737] md1: using deprecated bitmap file support [ 76.754195][ T5744] block device autoloading is deprecated and will be removed. [ 76.789966][ T5743] md1: using deprecated bitmap file support [ 77.609954][ T5027] Bluetooth: hci0: command 0x0419 tx timeout [ 77.892352][ T5745] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810d703900 (size 192): comm "syz-executor.0", pid 5379, jiffies 4294944298 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc bf6488f): [] kmem_cache_alloc+0x26f/0x310 [] prepare_creds+0x2b/0x4f0 [] copy_creds+0x44/0x280 [] copy_process+0x6c0/0x3230 [] kernel_clone+0x11b/0x690 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0x50/0x140 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff888100916870 (size 16): comm "syz-executor.0", pid 5379, jiffies 4294944298 hex dump (first 16 bytes): 00 00 00 00 00 00 00 00 00 43 89 00 81 88 ff ff .........C...... backtrace (crc 48b9a36d): [] __kmalloc+0x2cf/0x410 [] security_prepare_creds+0x12d/0x150 [] prepare_creds+0x32d/0x4f0 [] copy_creds+0x44/0x280 [] copy_process+0x6c0/0x3230 [] kernel_clone+0x11b/0x690 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0x50/0x140 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810b6a6400 (size 232): comm "syz-executor.0", pid 5480, jiffies 4294944306 hex dump (first 32 bytes): 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 1f 80 5f 49 01 00 00 00 00 00 00 00 ......_I........ backtrace (crc 12355a94): [] kmem_cache_alloc+0x26f/0x310 [] alloc_empty_file+0x6f/0x190 [] path_openat+0x4e/0x1c00 [] do_filp_open+0xd1/0x1c0 [] do_sys_openat2+0xf4/0x150 [] __x64_sys_openat+0xaf/0x100 [] do_syscall_64+0x50/0x140 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff888114ad0600 (size 32): comm "syz-executor.0", pid 5480, jiffies 4294944306 hex dump (first 32 bytes): ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 43 89 00 81 88 ff ff 00 00 00 00 00 00 00 00 .C.............. backtrace (crc 324d01b6): [] kmem_cache_alloc+0x26f/0x310 [] security_file_alloc+0x32/0x130 [] init_file+0x3e/0xe0 [] alloc_empty_file+0x8d/0x190 [] path_openat+0x4e/0x1c00 [] do_filp_open+0xd1/0x1c0 [] do_sys_openat2+0xf4/0x150 [] __x64_sys_openat+0xaf/0x100 [] do_syscall_64+0x50/0x140 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810a0f4f00 (size 192): comm "syz-executor.0", pid 5379, jiffies 4294944897 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 247ca4cd): [] kmem_cache_alloc+0x26f/0x310 [] prepare_creds+0x2b/0x4f0 [] copy_creds+0x44/0x280 [] copy_process+0x6c0/0x3230 [] kernel_clone+0x11b/0x690 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0x50/0x140 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 84.135231][ T5745] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak)