Warning: Permanently added '10.128.1.56' (ED25519) to the list of known hosts. 2024/04/14 15:08:39 ignoring optional flag "sandboxArg"="0" 2024/04/14 15:08:39 parsed 1 programs [ 70.195901][ T2521] cfg80211: failed to load regulatory.db 2024/04/14 15:08:46 executed programs: 0 [ 71.565327][ T5081] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.572439][ T5081] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.579828][ T5081] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.587248][ T5081] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.594552][ T5081] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.601841][ T5081] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.671415][ T5431] chnl_net:caif_netlink_parms(): no params data found [ 71.704815][ T5431] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.712357][ T5431] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.719554][ T5431] bridge_slave_0: entered allmulticast mode [ 71.726026][ T5431] bridge_slave_0: entered promiscuous mode [ 71.732859][ T5431] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.740027][ T5431] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.747321][ T5431] bridge_slave_1: entered allmulticast mode [ 71.753913][ T5431] bridge_slave_1: entered promiscuous mode [ 71.769839][ T5431] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.780146][ T5431] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.798726][ T5431] team0: Port device team_slave_0 added [ 71.805467][ T5431] team0: Port device team_slave_1 added [ 71.820201][ T5431] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 71.827147][ T5431] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 71.853287][ T5431] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 71.864776][ T5431] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 71.871699][ T5431] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 71.897710][ T5431] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 71.921980][ T5431] hsr_slave_0: entered promiscuous mode [ 71.927909][ T5431] hsr_slave_1: entered promiscuous mode [ 72.245093][ T5431] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 72.253727][ T5431] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 72.262925][ T5431] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 72.271666][ T5431] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 72.290127][ T5431] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.297289][ T5431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.304722][ T5431] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.311841][ T5431] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.354932][ T5431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.367478][ T779] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.375666][ T779] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.388163][ T5431] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.399090][ T5091] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.406418][ T5091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.431403][ T779] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.438562][ T779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.514493][ T5431] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.543681][ T5431] veth0_vlan: entered promiscuous mode [ 72.553687][ T5431] veth1_vlan: entered promiscuous mode [ 72.576448][ T5431] veth0_macvtap: entered promiscuous mode [ 72.585528][ T5431] veth1_macvtap: entered promiscuous mode [ 72.600256][ T5431] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.612988][ T5431] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.623611][ T5431] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.632668][ T5431] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.642322][ T5431] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.651665][ T5431] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.691752][ T2924] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.704610][ T2924] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.721683][ T2924] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.730134][ T2924] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.822481][ T5552] block device autoloading is deprecated and will be removed. [ 72.864286][ T5542] md1: using deprecated bitmap file support [ 73.634288][ T5081] Bluetooth: hci0: command tx timeout [ 75.724360][ T5081] Bluetooth: hci0: command tx timeout [ 77.804289][ T5081] Bluetooth: hci0: command tx timeout 2024/04/14 15:08:52 executed programs: 1 [ 78.194206][ T5793] block device autoloading is deprecated and will be removed. [ 78.244274][ T5792] md1: using deprecated bitmap file support [ 78.318415][ T5797] block device autoloading is deprecated and will be removed. [ 78.394354][ T5796] md1: using deprecated bitmap file support [ 79.310418][ T5798] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 79.874306][ T5081] Bluetooth: hci0: command tx timeout [ 84.207372][ T5798] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888114593840 (size 192): comm "syz-executor.0", pid 5431, jiffies 4294944511 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f6630258): [] kmem_cache_alloc+0x271/0x310 [] prepare_creds+0x22/0x4b0 [] copy_creds+0x44/0x290 [] copy_process+0x6dc/0x3530 [] kernel_clone+0x11a/0x680 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0xa0/0x1d0 [] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888102ac8570 (size 16): comm "syz-executor.0", pid 5431, jiffies 4294944511 hex dump (first 16 bytes): 00 00 00 00 00 00 00 00 00 a3 86 00 81 88 ff ff ................ backtrace (crc ba4fb7af): [] __kmalloc+0x2ce/0x410 [] security_prepare_creds+0x13d/0x160 [] prepare_creds+0x32c/0x4b0 [] copy_creds+0x44/0x290 [] copy_process+0x6dc/0x3530 [] kernel_clone+0x11a/0x680 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0xa0/0x1d0 [] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8881135ee600 (size 232): comm "syz-executor.0", pid 5542, jiffies 4294944519 hex dump (first 32 bytes): 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 1f 80 5f 49 01 00 00 00 00 00 00 00 ......_I........ backtrace (crc 242ab487): [] kmem_cache_alloc+0x271/0x310 [] alloc_empty_file+0x6f/0x1a0 [] path_openat+0x48/0x1c10 [] do_filp_open+0xe3/0x1d0 [] do_sys_openat2+0xf8/0x150 [] __x64_sys_openat+0xb3/0x100 [] do_syscall_64+0xa0/0x1d0 [] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88810c8a6120 (size 32): comm "syz-executor.0", pid 5542, jiffies 4294944519 hex dump (first 32 bytes): ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 a3 86 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace (crc 68600018): [] kmem_cache_alloc+0x271/0x310 [] security_file_alloc+0x32/0x140 [] init_file+0x3e/0xe0 [] alloc_empty_file+0x8d/0x1a0 [] path_openat+0x48/0x1c10 [] do_filp_open+0xe3/0x1d0 [] do_sys_openat2+0xf8/0x150 [] __x64_sys_openat+0xb3/0x100 [] do_syscall_64+0xa0/0x1d0 [] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8881147fbd80 (size 192): comm "syz-executor.0", pid 5431, jiffies 4294945050 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 668181c9): [] kmem_cache_alloc+0x271/0x310 [] prepare_creds+0x22/0x4b0 [] copy_creds+0x44/0x290 [] copy_process+0x6dc/0x3530 [] kernel_clone+0x11a/0x680 [] __do_sys_clone+0x7c/0xb0 [] do_syscall_64+0xa0/0x1d0 [] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.155329][ T5798] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak)