Warning: Permanently added '10.128.0.74' (ECDSA) to the list of known hosts. 2023/04/29 00:46:11 ignoring optional flag "sandboxArg"="0" 2023/04/29 00:46:12 parsed 1 programs 2023/04/29 00:46:12 executed programs: 0 [ 65.514033][ T3856] chnl_net:caif_netlink_parms(): no params data found [ 65.546983][ T3856] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.554433][ T3856] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.562628][ T3856] device bridge_slave_0 entered promiscuous mode [ 65.571058][ T3856] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.578818][ T3856] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.586651][ T3856] device bridge_slave_1 entered promiscuous mode [ 65.605163][ T3856] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.616367][ T3856] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.636683][ T3856] team0: Port device team_slave_0 added [ 65.643666][ T3856] team0: Port device team_slave_1 added [ 65.658512][ T3856] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 65.666280][ T3856] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 65.693187][ T3856] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 65.705923][ T3856] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 65.713445][ T3856] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 65.741299][ T3856] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 65.766023][ T3856] device hsr_slave_0 entered promiscuous mode [ 65.773505][ T3856] device hsr_slave_1 entered promiscuous mode [ 66.169830][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 66.176267][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 [ 66.228487][ T3856] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 66.240156][ T3856] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 66.249748][ T3856] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 66.259655][ T3856] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 66.280276][ T3856] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.287555][ T3856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.294979][ T3856] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.302106][ T3856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.351898][ T3856] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.366279][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.375579][ T3517] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.385186][ T3517] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.394155][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 66.405775][ T3856] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.429742][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.439297][ T3517] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.446787][ T3517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.455236][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.464291][ T3517] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.471593][ T3517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.481886][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.501379][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.509923][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.519250][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.527931][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.537819][ T3856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.636521][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.644415][ T3519] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.656104][ T3856] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.675950][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 66.685826][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.704425][ T3856] device veth0_vlan entered promiscuous mode [ 66.714100][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 66.724109][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.739302][ T3856] device veth1_vlan entered promiscuous mode [ 66.750345][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.758821][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 66.766614][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 66.790979][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 66.800288][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 66.809340][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 66.819376][ T3856] device veth0_macvtap entered promiscuous mode [ 66.831059][ T3856] device veth1_macvtap entered promiscuous mode [ 66.846100][ T3856] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.853992][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 66.863452][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 66.871918][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 66.881132][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.892241][ T3856] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 66.902295][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 66.911895][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.923482][ T3856] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.934752][ T3856] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.944230][ T3856] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.954504][ T3856] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.016458][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.028789][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.049089][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 67.062245][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.072189][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.083043][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 67.114072][ T3969] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 67.189398][ T3969] [ 67.191969][ T3969] ============================= [ 67.196963][ T3969] WARNING: suspicious RCU usage [ 67.203281][ T3969] 5.15.109-syzkaller #0 Not tainted [ 67.209533][ T3969] ----------------------------- [ 67.214394][ T3969] include/linux/kvm_host.h:880 suspicious rcu_dereference_check() usage! [ 67.225012][ T3969] [ 67.225012][ T3969] other info that might help us debug this: [ 67.225012][ T3969] [ 67.236485][ T3969] [ 67.236485][ T3969] rcu_scheduler_active = 2, debug_locks = 1 [ 67.246386][ T3969] 1 lock held by syz-executor.0/3969: [ 67.252470][ T3969] #0: ffff88806f0e40c8 (&vcpu->mutex){+.+.}-{3:3}, at: kvm_vcpu_ioctl+0x18d/0xa70 [ 67.263422][ T3969] [ 67.263422][ T3969] stack backtrace: [ 67.270788][ T3969] CPU: 1 PID: 3969 Comm: syz-executor.0 Not tainted 5.15.109-syzkaller #0 [ 67.280060][ T3969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 67.290427][ T3969] Call Trace: [ 67.293726][ T3969] [ 67.296662][ T3969] dump_stack_lvl+0x163/0x213 [ 67.301377][ T3969] ? io_uring_drop_tctx_refs+0x15d/0x15d [ 67.307105][ T3969] ? lockdep_rcu_suspicious+0x158/0x1c0 [ 67.312667][ T3969] kvm_vcpu_memslots+0x12a/0x170 [ 67.317608][ T3969] kvm_vcpu_gfn_to_memslot+0x23/0x2f0 [ 67.323255][ T3969] kvm_vcpu_unmap+0x58/0x80 [ 67.327766][ T3969] nested_vmx_vmexit+0x10c3/0x2410 [ 67.333102][ T3969] ? nested_mark_vmcs12_pages_dirty+0x250/0x250 [ 67.339346][ T3969] ? __might_fault+0xa4/0xf0 [ 67.344111][ T3969] ? kvm_arch_vcpu_load+0x3e1/0x5a0 [ 67.349320][ T3969] ? __lock_acquire+0x1ff0/0x1ff0 [ 67.354544][ T3969] vmx_leave_nested+0x5e/0xa0 [ 67.359337][ T3969] kvm_vcpu_ioctl_x86_set_vcpu_events+0x6f6/0x10a0 [ 67.365858][ T3969] kvm_arch_vcpu_ioctl+0x637/0x18d0 [ 67.371194][ T3969] ? stack_trace_save+0x1c0/0x1c0 [ 67.377140][ T3969] ? kvm_arch_vcpu_put+0x6c0/0x6c0 [ 67.382754][ T3969] ? reacquire_held_locks+0x660/0x660 [ 67.388478][ T3969] ? stack_trace_save+0x113/0x1c0 [ 67.393969][ T3969] ? stack_trace_snprint+0xe0/0xe0 [ 67.399248][ T3969] ? kfree+0xf1/0x270 [ 67.403266][ T3969] ? kasan_set_track+0x62/0x80 [ 67.408034][ T3969] ? kasan_set_track+0x4b/0x80 [ 67.412803][ T3969] ? kasan_set_free_info+0x1f/0x40 [ 67.417920][ T3969] ? ____kasan_slab_free+0xd8/0x120 [ 67.423426][ T3969] ? slab_free_freelist_hook+0xdd/0x160 [ 67.429554][ T3969] ? mark_lock+0x98/0x340 [ 67.434002][ T3969] ? read_lock_is_recursive+0x10/0x10 [ 67.439987][ T3969] ? __mutex_trylock_common+0x17e/0x2e0 [ 67.445757][ T3969] ? __might_sleep+0xc0/0xc0 [ 67.450668][ T3969] ? rcu_lock_release+0x20/0x20 [ 67.455739][ T3969] ? __lock_acquire+0x1ff0/0x1ff0 [ 67.461127][ T3969] ? slab_free_freelist_hook+0xdd/0x160 [ 67.467937][ T3969] ? __mutex_lock_common+0x444/0x25a0 [ 67.473579][ T3969] ? tomoyo_path_number_perm+0x59c/0x720 [ 67.479220][ T3969] ? kvm_vcpu_ioctl+0x18d/0xa70 [ 67.484079][ T3969] ? mutex_lock_io_nested+0x60/0x60 [ 67.489301][ T3969] kvm_vcpu_ioctl+0x732/0xa70 [ 67.493996][ T3969] ? kvm_clear_stat_per_vcpu+0x190/0x190 [ 67.499663][ T3969] ? security_file_ioctl+0x31/0x80 [ 67.504784][ T3969] __se_sys_ioctl+0xa7/0xf0 [ 67.509594][ T3969] do_syscall_64+0x3d/0xb0 [ 67.514019][ T3969] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 67.520098][ T3969] RIP: 0033:0x7f549ea4a0f9 [ 67.524519][ T3969] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 67.544300][ T3969] RSP: 002b:00007f549ddbc168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 67.552711][ T3969] RAX: ffffffffffffffda RBX: 00007f549eb69f80 RCX: 00007f549ea4a0f9 [ 67.560887][ T3969] RDX: 00000000200000c0 RSI: 000000004040aea0 RDI: 0000000000000005 [ 67.569121][ T3969] RBP: 00007f549eaa5b39 R08: 0000000000000000 R09: 0000000000000000 [ 67.577236][ T3969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 67.585410][ T3969] R13: 00007ffe15fc9b8f R14: 00007f549ddbc300 R15: 0000000000022000 [ 67.593842][ T3969] [ 67.599848][ T21] Bluetooth: hci0: command 0x0409 tx timeout [ 69.697186][ T13] Bluetooth: hci0: command 0x041b tx timeout 2023/04/29 00:46:17 executed programs: 24 [ 71.289534][ T1283] cfg80211: failed to load regulatory.db [ 71.767073][ T1283] Bluetooth: hci0: command 0x040f tx timeout [ 73.847017][ T3519] Bluetooth: hci0: command 0x0419 tx timeout 2023/04/29 00:46:22 executed programs: 73