[ 40.691100][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.699134][ T8] device veth1_macvtap left promiscuous mode [ 40.705393][ T8] device veth0_macvtap left promiscuous mode [ 40.711572][ T8] device veth1_vlan left promiscuous mode [ 40.717380][ T8] device veth0_vlan left promiscuous mode [ 40.741667][ T8] team0 (unregistering): Port device team_slave_1 removed [ 40.749616][ T8] team0 (unregistering): Port device team_slave_0 removed [ 40.757428][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 40.766565][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 40.781281][ T8] bond0 (unregistering): Released all slaves Warning: Permanently added '10.128.1.82' (ECDSA) to the list of known hosts. 2022/10/05 20:03:06 ignoring optional flag "sandboxArg"="0" 2022/10/05 20:03:06 parsed 1 programs 2022/10/05 20:03:14 executed programs: 0 [ 63.317285][ T45] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 65.398398][ T3613] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 65.405622][ T3613] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 65.412797][ T3613] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 65.420370][ T3613] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 65.427660][ T3613] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 65.434776][ T3613] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 65.442286][ T4073] Bluetooth: hci0: HCI_REQ-0x0c1a [ 65.473115][ T4073] chnl_net:caif_netlink_parms(): no params data found [ 65.490183][ T4073] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.497391][ T4073] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.504686][ T4073] device bridge_slave_0 entered promiscuous mode [ 65.511753][ T4073] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.518952][ T4073] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.526248][ T4073] device bridge_slave_1 entered promiscuous mode [ 65.536720][ T4073] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.546521][ T4073] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.559463][ T4073] team0: Port device team_slave_0 added [ 65.565624][ T4073] team0: Port device team_slave_1 added [ 65.575217][ T4073] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 65.582188][ T4073] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 65.608161][ T4073] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 65.619253][ T4073] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 65.626177][ T4073] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 65.652146][ T4073] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 65.668355][ T4073] device hsr_slave_0 entered promiscuous mode [ 65.674749][ T4073] device hsr_slave_1 entered promiscuous mode [ 66.107715][ T4073] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 66.115541][ T4073] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 66.123856][ T4073] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 66.132181][ T4073] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 66.144811][ T4073] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.151914][ T4073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.159199][ T4073] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.166268][ T4073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.189836][ T4073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.199315][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.207205][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.215713][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.223507][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 66.233289][ T4073] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.241940][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.250649][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.257724][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.273292][ T4073] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 66.284266][ T4073] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.296394][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.305296][ T4175] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.312381][ T4175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.320309][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.328844][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.337107][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.345585][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.354173][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.361856][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.394429][ T3607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.401908][ T3607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.410685][ T4073] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.421923][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.435866][ T4073] device veth0_vlan entered promiscuous mode [ 66.442667][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.451073][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.459314][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 66.468395][ T4073] device veth1_vlan entered promiscuous mode [ 66.478367][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 66.486130][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 66.497621][ T4073] device veth0_macvtap entered promiscuous mode [ 66.505098][ T4073] device veth1_macvtap entered promiscuous mode [ 66.512561][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 66.521143][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 66.530111][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 66.541312][ T4073] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.549684][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 66.558078][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 66.566523][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.576410][ T4073] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 66.584153][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 66.592948][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.602515][ T4073] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.611864][ T4073] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.620905][ T4073] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.629933][ T4073] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.662573][ T4262] loop0: detected capacity change from 0 to 32768 [ 66.672132][ T4262] read_mapping_page failed! [ 66.681024][ T4262] ERROR: (device loop0): txAbort: [ 66.681024][ T4262] [ 66.688948][ T4262] ERROR: (device loop0): remounting filesystem as read-only [ 66.696489][ T4262] ======================================================= [ 66.696489][ T4262] WARNING: The mand mount option has been deprecated and [ 66.696489][ T4262] and is ignored by this kernel. Remove the mand [ 66.696489][ T4262] option from the mount to silence this warning. [ 66.696489][ T4262] ======================================================= [ 67.477312][ T3613] Bluetooth: hci0: command 0x0409 tx timeout [ 69.557262][ T3613] Bluetooth: hci0: command 0x041b tx timeout [ 69.877720][ T1235] ieee802154 phy0 wpan0: encryption failed: -22 [ 69.877810][ T141] cfg80211: failed to load regulatory.db [ 69.884005][ T1235] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.647272][ T3613] Bluetooth: hci0: command 0x040f tx timeout 2022/10/05 20:03:26 executed programs: 1 [ 72.752175][ T4737] loop0: detected capacity change from 0 to 32768 [ 72.767860][ T4737] read_mapping_page failed! [ 72.772601][ T4737] ERROR: (device loop0): txAbort: [ 72.772601][ T4737] [ 72.780035][ T4737] ERROR: (device loop0): remounting filesystem as read-only [ 72.799765][ T4739] loop0: detected capacity change from 0 to 32768 [ 72.808284][ T4739] read_mapping_page failed! [ 72.812952][ T4739] ERROR: (device loop0): txAbort: [ 72.812952][ T4739] [ 72.820593][ T4739] ERROR: (device loop0): remounting filesystem as read-only [ 73.717300][ T3613] Bluetooth: hci0: command 0x0419 tx timeout 2022/10/05 20:03:32 executed programs: 3 [ 78.555784][ T4746] loop0: detected capacity change from 0 to 32768 [ 78.564922][ T4746] read_mapping_page failed! [ 78.569851][ T4746] ERROR: (device loop0): txAbort: [ 78.569851][ T4746] [ 78.577424][ T4746] ERROR: (device loop0): remounting filesystem as read-only [ 78.603653][ T4748] loop0: detected capacity change from 0 to 32768 [ 78.611507][ T4748] read_mapping_page failed! [ 78.616173][ T4748] ERROR: (device loop0): txAbort: [ 78.616173][ T4748] [ 78.623803][ T4748] ERROR: (device loop0): remounting filesystem as read-only [ 79.881176][ T4749] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 84.126616][ T4749] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 86.441550][ T4749] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810ace7200 (size 128): comm "syz-executor.0", pid 4737, jiffies 4294944545 (age 13.720s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 [] __get_metapage+0x38a/0x9b0 [] diNewExt+0x3f2/0x9d0 [] diAllocAG+0x9a4/0xd50 [] diAlloc+0x31f/0x900 [] ialloc+0x6a/0x3a0 [] jfs_mkdir+0xf7/0x480 [] vfs_mkdir+0x223/0x340 [] do_mkdirat+0x1a5/0x1e0 [] __x64_sys_mkdir+0x69/0x90 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881151d4700 (size 128): comm "syz-executor.0", pid 4737, jiffies 4294944545 (age 13.720s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 [] __get_metapage+0x38a/0x9b0 [] diNewExt+0x3f2/0x9d0 [] diAllocAG+0x9a4/0xd50 [] diAlloc+0x31f/0x900 [] ialloc+0x6a/0x3a0 [] jfs_mkdir+0xf7/0x480 [] vfs_mkdir+0x223/0x340 [] do_mkdirat+0x1a5/0x1e0 [] __x64_sys_mkdir+0x69/0x90 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881151d4680 (size 128): comm "syz-executor.0", pid 4737, jiffies 4294944545 (age 13.720s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 [] __get_metapage+0x38a/0x9b0 [] diNewExt+0x3f2/0x9d0 [] diAllocAG+0x9a4/0xd50 [] diAlloc+0x31f/0x900 [] ialloc+0x6a/0x3a0 [] jfs_mkdir+0xf7/0x480 [] vfs_mkdir+0x223/0x340 [] do_mkdirat+0x1a5/0x1e0 [] __x64_sys_mkdir+0x69/0x90 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881151d4500 (size 128): comm "syz-executor.0", pid 4739, jiffies 4294944549 (age 13.680s) hex dump (first 32 bytes): 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] mempool_alloc+0x73/0x230 [] __get_metapage+0x38a/0x9b0 [] diNewExt+0x3f2/0x9d0 [] diAllocAG+0x9a4/0xd50 [] diAlloc+0x31f/0x900 [] ialloc+0x6a/0x3a0 [] jfs_mkdir+0xf7/0x480 [] vfs_mkdir+0x223/0x340 [] do_mkdirat+0x1a5/0x1e0 [] __x64_sys_mkdir+0x69/0x90 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd