Warning: Permanently added '10.128.1.134' (ED25519) to the list of known hosts. 2024/01/12 16:08:01 ignoring optional flag "sandboxArg"="0" 2024/01/12 16:08:01 parsed 1 programs [ 70.247526][ T775] cfg80211: failed to load regulatory.db [ 71.253674][ T5375] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 2024/01/12 16:08:09 executed programs: 0 [ 72.007893][ T5375] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 72.046487][ T4426] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 72.053663][ T4426] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 72.061049][ T4426] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 72.068829][ T4426] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 72.076496][ T4426] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 72.083786][ T4426] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 72.161398][ T5383] chnl_net:caif_netlink_parms(): no params data found [ 72.197319][ T5383] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.204438][ T5383] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.211819][ T5383] bridge_slave_0: entered allmulticast mode [ 72.218867][ T5383] bridge_slave_0: entered promiscuous mode [ 72.225797][ T5383] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.233215][ T5383] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.240592][ T5383] bridge_slave_1: entered allmulticast mode [ 72.247335][ T5383] bridge_slave_1: entered promiscuous mode [ 72.264205][ T5383] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.274737][ T5383] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.294568][ T5383] team0: Port device team_slave_0 added [ 72.301399][ T5383] team0: Port device team_slave_1 added [ 72.317275][ T5383] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.324216][ T5383] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.350616][ T5383] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.362075][ T5383] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.369147][ T5383] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.395479][ T5383] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.421289][ T5383] hsr_slave_0: entered promiscuous mode [ 72.427847][ T5383] hsr_slave_1: entered promiscuous mode [ 72.825128][ T5383] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 72.834181][ T5383] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 72.844281][ T5383] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 72.853496][ T5383] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 72.873772][ T5383] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.881034][ T5383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.888575][ T5383] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.895873][ T5383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.943956][ T5383] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.957252][ T4764] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.965202][ T4764] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.978516][ T5383] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.990179][ T4764] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.997376][ T4764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.019584][ T5044] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.026704][ T5044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.104868][ T5383] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.136987][ T5383] veth0_vlan: entered promiscuous mode [ 73.147674][ T5383] veth1_vlan: entered promiscuous mode [ 73.172722][ T5383] veth0_macvtap: entered promiscuous mode [ 73.181443][ T5383] veth1_macvtap: entered promiscuous mode [ 73.196914][ T5383] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.210358][ T5383] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.221344][ T5383] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.230436][ T5383] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.240415][ T5383] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.249896][ T5383] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.294830][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.308936][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.329223][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.337606][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.165942][ T5033] Bluetooth: hci0: command 0x0409 tx timeout [ 76.245976][ T5033] Bluetooth: hci0: command 0x041b tx timeout [ 78.326115][ T5033] Bluetooth: hci0: command 0x040f tx timeout 2024/01/12 16:08:16 executed programs: 1 [ 80.405964][ T5033] Bluetooth: hci0: command 0x0419 tx timeout [ 80.552255][ T5752] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 86.663682][ T5752] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810cd72500 (size 240): comm "syz-executor.0", pid 5499, jiffies 4294944574 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 3c 0e 07 81 88 ff ff .........<...... backtrace (crc 586a8358): [] kmem_cache_alloc_node+0x28a/0x330 [] __alloc_skb+0x1ef/0x230 [] sock_wmalloc+0x63/0x90 [] pppoe_sendmsg+0x106/0x2d0 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x327/0x590 [] ksys_write+0x13b/0x170 [] do_syscall_64+0x50/0x140 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810aa36280 (size 640): comm "syz-executor.0", pid 5499, jiffies 4294944574 hex dump (first 32 bytes): 00 00 aa aa aa aa aa 0a aa aa aa aa aa 0a 88 64 ...............d 11 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc ef16711a): [] kmem_cache_alloc_node+0x28a/0x330 [] kmalloc_reserve+0xe2/0x170 [] __alloc_skb+0xd5/0x230 [] sock_wmalloc+0x63/0x90 [] pppoe_sendmsg+0x106/0x2d0 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x327/0x590 [] ksys_write+0x13b/0x170 [] do_syscall_64+0x50/0x140 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810cd72200 (size 240): comm "syz-executor.0", pid 5748, jiffies 4294945170 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 9c 16 1b 81 88 ff ff ................ backtrace (crc 2002505b): [] kmem_cache_alloc_node+0x28a/0x330 [] __alloc_skb+0x1ef/0x230 [] sock_wmalloc+0x63/0x90 [] pppoe_sendmsg+0x106/0x2d0 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x327/0x590 [] ksys_write+0x13b/0x170 [] do_syscall_64+0x50/0x140 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810d32c000 (size 640): comm "syz-executor.0", pid 5748, jiffies 4294945170 hex dump (first 32 bytes): 00 00 aa aa aa aa aa 0a aa aa aa aa aa 0a 88 64 ...............d 11 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc ef16711a): [] kmem_cache_alloc_node+0x28a/0x330 [] kmalloc_reserve+0xe2/0x170 [] __alloc_skb+0xd5/0x230 [] sock_wmalloc+0x63/0x90 [] pppoe_sendmsg+0x106/0x2d0 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x327/0x590 [] ksys_write+0x13b/0x170 [] do_syscall_64+0x50/0x140 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b