Warning: Permanently added '10.128.10.24' (ED25519) to the list of known hosts.
2023/12/08 10:49:28 ignoring optional flag "sandboxArg"="0"
2023/12/08 10:49:28 parsed 1 programs
[ 70.135820][ T28] cfg80211: failed to load regulatory.db
2023/12/08 10:49:36 executed programs: 0
[ 71.430135][ T5379] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 71.468234][ T4445] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 71.475308][ T4445] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 71.482649][ T4445] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 71.490329][ T4445] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 71.497810][ T4445] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 71.504994][ T4445] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 71.581496][ T5388] chnl_net:caif_netlink_parms(): no params data found
[ 71.618032][ T5388] bridge0: port 1(bridge_slave_0) entered blocking state
[ 71.625341][ T5388] bridge0: port 1(bridge_slave_0) entered disabled state
[ 71.632835][ T5388] bridge_slave_0: entered allmulticast mode
[ 71.639946][ T5388] bridge_slave_0: entered promiscuous mode
[ 71.647124][ T5388] bridge0: port 2(bridge_slave_1) entered blocking state
[ 71.654235][ T5388] bridge0: port 2(bridge_slave_1) entered disabled state
[ 71.661436][ T5388] bridge_slave_1: entered allmulticast mode
[ 71.667959][ T5388] bridge_slave_1: entered promiscuous mode
[ 71.684806][ T5388] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 71.695361][ T5388] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 71.715363][ T5388] team0: Port device team_slave_0 added
[ 71.722171][ T5388] team0: Port device team_slave_1 added
[ 71.738044][ T5388] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 71.745041][ T5388] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 71.771212][ T5388] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 71.782753][ T5388] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 71.789984][ T5388] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 71.816069][ T5388] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 71.841887][ T5388] hsr_slave_0: entered promiscuous mode
[ 71.847924][ T5388] hsr_slave_1: entered promiscuous mode
[ 72.282368][ T5388] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 72.292157][ T5388] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 72.302677][ T5388] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 72.312601][ T5388] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 72.335569][ T5388] bridge0: port 2(bridge_slave_1) entered blocking state
[ 72.342903][ T5388] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 72.350297][ T5388] bridge0: port 1(bridge_slave_0) entered blocking state
[ 72.357530][ T5388] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 72.415821][ T5388] 8021q: adding VLAN 0 to HW filter on device bond0
[ 72.430673][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 72.439900][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 72.453510][ T5388] 8021q: adding VLAN 0 to HW filter on device team0
[ 72.465543][ T28] bridge0: port 1(bridge_slave_0) entered blocking state
[ 72.472667][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 72.484448][ T28] bridge0: port 2(bridge_slave_1) entered blocking state
[ 72.491657][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 72.608536][ T5388] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 72.647759][ T5388] veth0_vlan: entered promiscuous mode
[ 72.659542][ T5388] veth1_vlan: entered promiscuous mode
[ 72.687509][ T5388] veth0_macvtap: entered promiscuous mode
[ 72.697870][ T5388] veth1_macvtap: entered promiscuous mode
[ 72.715288][ T5388] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 72.729408][ T5388] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 72.741279][ T5388] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 72.750571][ T5388] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 72.759739][ T5388] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 72.769964][ T5388] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 72.816188][ T76] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 72.824207][ T76] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 72.850566][ T76] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 72.858937][ T76] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 72.886407][ T5491] FAULT_INJECTION: forcing a failure.
[ 72.886407][ T5491] name failslab, interval 1, probability 0, space 0, times 1
[ 72.899076][ T5491] CPU: 1 PID: 5491 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-dirty #0
[ 72.908199][ T5491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[ 72.918391][ T5491] Call Trace:
[ 72.921678][ T5491]
[ 72.924619][ T5491] dump_stack_lvl+0x72/0xa0
[ 72.929141][ T5491] should_fail_ex+0x14e/0x160
[ 72.934360][ T5491] should_failslab+0x9/0x20
[ 72.938874][ T5491] kmem_cache_alloc+0x47/0x430
[ 72.943655][ T5491] ? radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[ 72.950178][ T5491] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[ 72.956530][ T5491] radix_tree_insert+0x14f/0x370
[ 72.961492][ T5491] qrtr_node_enqueue+0x57d/0x630
[ 72.966453][ T5491] ? __skb_clone+0x7a/0x140
[ 72.970973][ T5491] qrtr_bcast_enqueue+0x66/0xd0
[ 72.975844][ T5491] qrtr_sendmsg+0x232/0x450
[ 72.980548][ T5491] ? qrtr_endpoint_unregister+0x2d0/0x2d0
[ 72.986372][ T5491] __sock_sendmsg+0x52/0xa0
[ 72.990891][ T5491] sock_write_iter+0xfb/0x180
[ 72.995761][ T5491] vfs_write+0x327/0x590
[ 73.000320][ T5491] ksys_write+0x13b/0x170
[ 73.004937][ T5491] do_syscall_64+0x3f/0x110
[ 73.009504][ T5491] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 73.015693][ T5491] RIP: 0033:0x7faa3867cae9
[ 73.020294][ T5491] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 73.039995][ T5491] RSP: 002b:00007faa393a80c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 73.048588][ T5491] RAX: ffffffffffffffda RBX: 00007faa3879bf80 RCX: 00007faa3867cae9
[ 73.056571][ T5491] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
[ 73.064553][ T5491] RBP: 00007faa393a8120 R08: 0000000000000000 R09: 0000000000000000
[ 73.072709][ T5491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 73.080684][ T5491] R13: 000000000000000b R14: 00007faa3879bf80 R15: 00007ffcf04107e8
[ 73.088663][ T5491]
[ 73.584564][ T4445] Bluetooth: hci0: command 0x0409 tx timeout
[ 75.654611][ T4445] Bluetooth: hci0: command 0x041b tx timeout
[ 77.744594][ T4445] Bluetooth: hci0: command 0x040f tx timeout
2023/12/08 10:49:43 executed programs: 1
[ 79.375538][ T5751] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[ 79.814669][ T4445] Bluetooth: hci0: command 0x0419 tx timeout
BUG: memory leak
unreferenced object 0xffff88810c5a6000 (size 576):
comm "syz-executor.0", pid 5491, jiffies 4294944531 (age 12.550s)
hex dump (first 32 bytes):
3c 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 <...............
b0 ed 2e 1b 81 88 ff ff 18 60 5a 0c 81 88 ff ff .........`Z.....
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x370
[] qrtr_node_enqueue+0x57d/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b
BUG: memory leak
unreferenced object 0xffff88810c5a6248 (size 576):
comm "syz-executor.0", pid 5491, jiffies 4294944531 (age 12.550s)
hex dump (first 32 bytes):
36 0f 01 00 00 00 00 00 00 60 5a 0c 81 88 ff ff 6........`Z.....
b0 ed 2e 1b 81 88 ff ff 60 62 5a 0c 81 88 ff ff ........`bZ.....
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x370
[] qrtr_node_enqueue+0x57d/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b
BUG: memory leak
unreferenced object 0xffff88810c5a6490 (size 576):
comm "syz-executor.0", pid 5491, jiffies 4294944531 (age 12.550s)
hex dump (first 32 bytes):
30 3f 01 00 00 00 00 00 48 62 5a 0c 81 88 ff ff 0?......HbZ.....
b0 ed 2e 1b 81 88 ff ff a8 64 5a 0c 81 88 ff ff .........dZ.....
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x370
[] qrtr_node_enqueue+0x57d/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b
BUG: memory leak
unreferenced object 0xffff88810c5a66d8 (size 576):
comm "syz-executor.0", pid 5491, jiffies 4294944531 (age 12.550s)
hex dump (first 32 bytes):
2a 3f 00 00 00 00 00 00 90 64 5a 0c 81 88 ff ff *?.......dZ.....
b0 ed 2e 1b 81 88 ff ff f0 66 5a 0c 81 88 ff ff .........fZ.....
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x370
[] qrtr_node_enqueue+0x57d/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b