Warning: Permanently added '10.128.0.87' (ECDSA) to the list of known hosts. 2023/06/18 19:42:54 ignoring optional flag "sandboxArg"="0" 2023/06/18 19:42:54 parsed 1 programs 2023/06/18 19:42:54 executed programs: 0 [ 58.636066][ T3857] chnl_net:caif_netlink_parms(): no params data found [ 58.667566][ T3857] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.674737][ T3857] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.682481][ T3857] device bridge_slave_0 entered promiscuous mode [ 58.690545][ T3857] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.698166][ T3857] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.705825][ T3857] device bridge_slave_1 entered promiscuous mode [ 58.728127][ T3857] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.741252][ T3857] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.763778][ T3857] team0: Port device team_slave_0 added [ 58.771163][ T3857] team0: Port device team_slave_1 added [ 58.786116][ T3857] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 58.793239][ T3857] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 58.820059][ T3857] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 58.831906][ T3857] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 58.839273][ T3857] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 58.866083][ T3857] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 58.890651][ T3857] device hsr_slave_0 entered promiscuous mode [ 58.897303][ T3857] device hsr_slave_1 entered promiscuous mode [ 59.281225][ T3857] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 59.292577][ T3857] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 59.302213][ T3857] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 59.312126][ T3857] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 59.333349][ T3857] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.340477][ T3857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.347885][ T3857] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.355234][ T3857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.401761][ T3857] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.416201][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.427420][ T1070] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.436036][ T1070] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.444610][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 59.458845][ T3857] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.470155][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.479647][ T1070] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.486776][ T1070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.506940][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.516029][ T3517] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.523357][ T3517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.533663][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.551389][ T3857] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 59.563286][ T3857] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 59.576735][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.584753][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.594551][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.603859][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.614008][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.692112][ T3857] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.702007][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 59.711060][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.737042][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 59.747952][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.761166][ T3857] device veth0_vlan entered promiscuous mode [ 59.769387][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 59.778139][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.790724][ T3857] device veth1_vlan entered promiscuous mode [ 59.800660][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.809358][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.817639][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 59.838988][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 59.848343][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 59.857348][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.868109][ T3857] device veth0_macvtap entered promiscuous mode [ 59.880411][ T3857] device veth1_macvtap entered promiscuous mode [ 59.896221][ T3857] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 59.904135][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 59.913628][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 59.928335][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 59.937559][ T1070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 59.949001][ T3857] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 59.958737][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 59.969728][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 59.980615][ T3857] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.992306][ T3857] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.002087][ T3857] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.013722][ T3857] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 60.084775][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.111434][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.121008][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 60.132113][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 60.143819][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 60.157487][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 60.186847][ T3967] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 60.254275][ T3967] [ 60.256934][ T3967] ============================= [ 60.261787][ T3967] WARNING: suspicious RCU usage [ 60.267358][ T3967] 5.15.117-syzkaller #0 Not tainted [ 60.272776][ T3967] ----------------------------- [ 60.279535][ T3967] include/linux/kvm_host.h:878 suspicious rcu_dereference_check() usage! [ 60.289148][ T3967] [ 60.289148][ T3967] other info that might help us debug this: [ 60.289148][ T3967] [ 60.300964][ T3967] [ 60.300964][ T3967] rcu_scheduler_active = 2, debug_locks = 1 [ 60.310959][ T3967] 1 lock held by syz-executor.0/3967: [ 60.319014][ T3967] #0: ffff88807c8300c8 (&vcpu->mutex){+.+.}-{3:3}, at: kvm_vcpu_ioctl+0x198/0xb50 [ 60.329418][ T3967] [ 60.329418][ T3967] stack backtrace: [ 60.336770][ T3967] CPU: 0 PID: 3967 Comm: syz-executor.0 Not tainted 5.15.117-syzkaller #0 [ 60.345278][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 60.355431][ T3967] Call Trace: [ 60.358905][ T3967] [ 60.361838][ T3967] dump_stack_lvl+0x57/0x7d [ 60.366437][ T3967] kvm_vcpu_gfn_to_memslot+0x3ee/0x540 [ 60.371910][ T3967] kvm_vcpu_unmap+0x39/0x90 [ 60.376595][ T3967] nested_vmx_vmexit+0x74c/0x3400 [ 60.381728][ T3967] ? nested_mark_vmcs12_pages_dirty+0x220/0x220 [ 60.387972][ T3967] ? __might_fault+0xb5/0x160 [ 60.392645][ T3967] ? lock_downgrade+0x6e0/0x6e0 [ 60.397590][ T3967] ? vmx_leave_nested+0x7c/0xa0 [ 60.402785][ T3967] vmx_leave_nested+0x7c/0xa0 [ 60.407463][ T3967] kvm_vcpu_ioctl_x86_set_vcpu_events+0x7cb/0xe80 [ 60.413972][ T3967] kvm_arch_vcpu_ioctl+0x545/0x2db0 [ 60.419359][ T3967] ? kvm_arch_vcpu_put+0x800/0x800 [ 60.424473][ T3967] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 60.430554][ T3967] ? lock_acquire+0x1ab/0x4e0 [ 60.435322][ T3967] ? find_held_lock+0x2d/0x110 [ 60.440365][ T3967] ? lock_acquire+0x1ab/0x4e0 [ 60.445182][ T3967] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 60.451090][ T3967] ? __mutex_lock+0x21c/0x12f0 [ 60.455951][ T3967] ? kvm_vcpu_ioctl+0x198/0xb50 [ 60.460821][ T3967] ? mutex_lock_io_nested+0x1150/0x1150 [ 60.466894][ T3967] ? tomoyo_path_number_perm+0x1eb/0x4e0 [ 60.472528][ T3967] ? tomoyo_execute_permission+0x470/0x470 [ 60.478345][ T3967] kvm_vcpu_ioctl+0x747/0xb50 [ 60.483986][ T3967] ? kvm_clear_dirty_log_protect+0x7e0/0x7e0 [ 60.490064][ T3967] ? __context_tracking_exit+0x80/0x90 [ 60.495535][ T3967] ? lock_downgrade+0x6e0/0x6e0 [ 60.500481][ T3967] ? __fget_files+0x1d7/0x3d0 [ 60.505170][ T3967] __x64_sys_ioctl+0x11f/0x190 [ 60.509949][ T3967] do_syscall_64+0x35/0xb0 [ 60.514642][ T3967] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 60.520538][ T3967] RIP: 0033:0x7f77d8ca0169 [ 60.525066][ T3967] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 60.545253][ T3967] RSP: 002b:00007f77d8012168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 60.553695][ T3967] RAX: ffffffffffffffda RBX: 00007f77d8dbff80 RCX: 00007f77d8ca0169 [ 60.562193][ T3967] RDX: 00000000200000c0 RSI: 000000004040aea0 RDI: 0000000000000005 [ 60.570511][ T3967] RBP: 00007f77d8cfbca1 R08: 0000000000000000 R09: 0000000000000000 [ 60.579021][ T3967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 60.587078][ T3967] R13: 00007ffe4773bd8f R14: 00007f77d8012300 R15: 0000000000022000 [ 60.595063][ T3967] [ 60.635771][ T3520] Bluetooth: hci0: command 0x0409 tx timeout [ 62.715122][ T3519] Bluetooth: hci0: command 0x041b tx timeout 2023/06/18 19:42:59 executed programs: 26 [ 64.795110][ T3519] Bluetooth: hci0: command 0x040f tx timeout [ 66.078315][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 66.085111][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 [ 66.875090][ T3519] Bluetooth: hci0: command 0x0419 tx timeout 2023/06/18 19:43:04 executed programs: 78