Warning: Permanently added '10.128.0.132' (ED25519) to the list of known hosts. 2023/07/23 09:53:54 ignoring optional flag "sandboxArg"="0" 2023/07/23 09:53:54 parsed 1 programs 2023/07/23 09:54:02 executed programs: 0 [ 61.834581][ T4419] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 61.841718][ T4419] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 61.849297][ T4419] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 61.856737][ T47] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 61.864181][ T4419] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 61.899425][ T5364] chnl_net:caif_netlink_parms(): no params data found [ 61.916995][ T5364] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.924247][ T5364] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.931623][ T5364] bridge_slave_0: entered allmulticast mode [ 61.938230][ T5364] bridge_slave_0: entered promiscuous mode [ 61.945001][ T5364] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.952145][ T5364] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.959258][ T5364] bridge_slave_1: entered allmulticast mode [ 61.965555][ T5364] bridge_slave_1: entered promiscuous mode [ 61.975427][ T5364] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.985377][ T5364] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.999038][ T5364] team0: Port device team_slave_0 added [ 62.005746][ T5364] team0: Port device team_slave_1 added [ 62.015180][ T5364] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 62.022119][ T5364] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.048589][ T5364] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 62.059870][ T5364] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 62.067111][ T5364] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.094165][ T5364] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 62.110937][ T5364] hsr_slave_0: entered promiscuous mode [ 62.116983][ T5364] hsr_slave_1: entered promiscuous mode [ 62.645470][ T5364] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 62.654373][ T5364] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 62.663432][ T5364] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 62.671604][ T5364] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 62.684698][ T5364] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.691975][ T5364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.699366][ T5364] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.706537][ T5364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.728615][ T5364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.741175][ T27] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.754389][ T27] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.763774][ T5364] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.774478][ T27] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.782122][ T27] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.790094][ T27] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.797598][ T27] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.847596][ T5364] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.865196][ T5364] veth0_vlan: entered promiscuous mode [ 62.872851][ T5364] veth1_vlan: entered promiscuous mode [ 62.886475][ T5364] veth0_macvtap: entered promiscuous mode [ 62.894980][ T5364] veth1_macvtap: entered promiscuous mode [ 62.906558][ T5364] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 62.916521][ T5364] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 62.925761][ T5364] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.935298][ T5364] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.944637][ T5364] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.954179][ T5364] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.981104][ T5188] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 62.994473][ T5188] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 63.007299][ T5188] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 63.015442][ T5188] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 63.934402][ T5013] Bluetooth: hci0: command 0x0409 tx timeout [ 66.013676][ T5013] Bluetooth: hci0: command 0x041b tx timeout [ 68.093620][ T4419] Bluetooth: hci0: command 0x040f tx timeout 2023/07/23 09:54:09 executed programs: 1 [ 70.013747][ T774] cfg80211: failed to load regulatory.db [ 70.023685][ T1230] ieee802154 phy0 wpan0: encryption failed: -22 [ 70.030004][ T1230] ieee802154 phy1 wpan1: encryption failed: -22 [ 70.173624][ T4419] Bluetooth: hci0: command 0x0419 tx timeout 2023/07/23 09:54:15 executed programs: 3 [ 76.154271][ T5744] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 82.855018][ T5744] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888114e8a540 (size 64): comm "syz-executor.0", pid 5724, jiffies 4294944177 (age 13.670s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 54 38 15 81 88 ff ff .........T8..... backtrace: [] kmalloc_trace+0x25/0x90 [] vma_node_allow+0x36/0x150 [] drm_gem_handle_create_tail+0x102/0x240 [] drm_gem_shmem_dumb_create+0xc0/0x1c0 [] drm_mode_create_dumb_ioctl+0x118/0x140 [] drm_ioctl_kernel+0x14c/0x260 [] drm_ioctl+0x374/0x680 [] __x64_sys_ioctl+0xf2/0x140 [] do_syscall_64+0x38/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888114e8a040 (size 64): comm "syz-executor.0", pid 5724, jiffies 4294944177 (age 13.670s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 54 38 15 81 88 ff ff .........T8..... backtrace: [] kmalloc_trace+0x25/0x90 [] vma_node_allow+0x36/0x150 [] drm_gem_handle_create_tail+0x102/0x240 [] drm_gem_shmem_dumb_create+0xc0/0x1c0 [] drm_mode_create_dumb_ioctl+0x118/0x140 [] drm_ioctl_kernel+0x14c/0x260 [] drm_ioctl+0x374/0x680 [] __x64_sys_ioctl+0xf2/0x140 [] do_syscall_64+0x38/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888114e8a240 (size 64): comm "syz-executor.0", pid 5724, jiffies 4294944177 (age 13.670s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 54 38 15 81 88 ff ff .........T8..... backtrace: [] kmalloc_trace+0x25/0x90 [] vma_node_allow+0x36/0x150 [] drm_gem_handle_create_tail+0x102/0x240 [] drm_gem_shmem_dumb_create+0xc0/0x1c0 [] drm_mode_create_dumb_ioctl+0x118/0x140 [] drm_ioctl_kernel+0x14c/0x260 [] drm_ioctl+0x374/0x680 [] __x64_sys_ioctl+0xf2/0x140 [] do_syscall_64+0x38/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888115a44380 (size 64): comm "syz-executor.0", pid 5739, jiffies 4294944741 (age 8.030s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 0a e1 0a 81 88 ff ff ................ backtrace: [] kmalloc_trace+0x25/0x90 [] vma_node_allow+0x36/0x150 [] drm_gem_handle_create_tail+0x102/0x240 [] drm_gem_shmem_dumb_create+0xc0/0x1c0 [] drm_mode_create_dumb_ioctl+0x118/0x140 [] drm_ioctl_kernel+0x14c/0x260 [] drm_ioctl+0x374/0x680 [] __x64_sys_ioctl+0xf2/0x140 [] do_syscall_64+0x38/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd