Warning: Permanently added '10.128.0.63' (ED25519) to the list of known hosts. 2026/01/27 07:26:00 ignoring optional flag "type"="gce" 2026/01/27 07:26:00 parsed 1 programs [ 70.154522][ T1309] ieee802154 phy0 wpan0: encryption failed: -22 [ 70.160798][ T1309] ieee802154 phy1 wpan1: encryption failed: -22 2026/01/27 07:26:08 executed programs: 0 [ 73.419396][ T5999] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 73.453222][ T5135] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 73.461955][ T5135] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 73.469056][ T5135] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 73.476312][ T5135] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 73.483430][ T5135] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 73.518533][ T6005] chnl_net:caif_netlink_parms(): no params data found [ 73.536809][ T6005] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.544105][ T6005] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.551268][ T6005] bridge_slave_0: entered allmulticast mode [ 73.557699][ T6005] bridge_slave_0: entered promiscuous mode [ 73.564977][ T6005] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.572272][ T6005] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.579543][ T6005] bridge_slave_1: entered allmulticast mode [ 73.585927][ T6005] bridge_slave_1: entered promiscuous mode [ 73.596954][ T6005] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.606831][ T6005] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.620244][ T6005] team0: Port device team_slave_0 added [ 73.626409][ T6005] team0: Port device team_slave_1 added [ 73.635936][ T6005] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.642869][ T6005] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 73.668866][ T6005] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.679789][ T6005] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.686855][ T6005] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 73.712869][ T6005] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.729525][ T6005] hsr_slave_0: entered promiscuous mode [ 73.735527][ T6005] hsr_slave_1: entered promiscuous mode [ 73.971077][ T6005] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.979900][ T6005] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.987912][ T6005] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.995688][ T6005] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 74.017049][ T6005] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.024141][ T6005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.031482][ T6005] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.038572][ T6005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.060586][ T6005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.071414][ T1101] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.083580][ T1101] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.096421][ T6005] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.106106][ T58] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.113363][ T58] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.122789][ T1101] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.129868][ T1101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.157289][ T6005] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.203596][ T6005] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.223256][ T6005] veth0_vlan: entered promiscuous mode [ 74.231272][ T6005] veth1_vlan: entered promiscuous mode [ 74.245097][ T6005] veth0_macvtap: entered promiscuous mode [ 74.253826][ T6005] veth1_macvtap: entered promiscuous mode [ 74.265204][ T6005] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.274936][ T6005] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.284765][ T4427] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.300748][ T4427] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.310054][ T4427] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.321230][ T4427] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.294157][ T3406] cfg80211: failed to load regulatory.db [ 75.513980][ T5135] Bluetooth: hci0: command tx timeout [ 77.593995][ T5135] Bluetooth: hci0: command tx timeout [ 79.674354][ T5135] Bluetooth: hci0: command tx timeout 2026/01/27 07:26:15 executed programs: 1 [ 80.044540][ T6205] FAULT_INJECTION: forcing a failure. [ 80.044540][ T6205] name failslab, interval 1, probability 0, space 0, times 0 [ 80.057260][ T6205] CPU: 0 UID: 0 PID: 6205 Comm: syz-executor.0 Not tainted syzkaller #0 PREEMPT(full) [ 80.057289][ T6205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 80.057305][ T6205] Call Trace: [ 80.057310][ T6205] [ 80.057315][ T6205] dump_stack_lvl+0x97/0xe0 [ 80.057346][ T6205] should_fail_ex.cold+0x2f/0x34 [ 80.057360][ T6205] should_failslab+0x44/0x70 [ 80.057376][ T6205] kmem_cache_alloc_noprof+0x65/0x580 [ 80.057395][ T6205] radix_tree_node_alloc.constprop.0+0x66/0x180 [ 80.057417][ T6205] radix_tree_insert+0x140/0x390 [ 80.057433][ T6205] qrtr_node_enqueue+0x59d/0x620 [ 80.057447][ T6205] ? skb_copy_header+0x1c/0x90 [ 80.057460][ T6205] ? skb_set_owner_w+0x133/0x2b0 [ 80.057473][ T6205] qrtr_bcast_enqueue+0x65/0xe0 [ 80.057488][ T6205] qrtr_sendmsg+0x232/0x460 [ 80.057502][ T6205] ? __pfx_qrtr_bcast_enqueue+0x10/0x10 [ 80.057517][ T6205] sock_write_iter+0x295/0x2b0 [ 80.057529][ T6205] vfs_write+0x3ac/0x730 [ 80.057543][ T6205] ? __pfx_sock_write_iter+0x10/0x10 [ 80.057555][ T6205] ksys_write+0x141/0x170 [ 80.057575][ T6205] do_syscall_64+0xa4/0xf80 [ 80.057594][ T6205] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.057607][ T6205] RIP: 0033:0x7fc35f86d079 [ 80.057622][ T6205] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 d0 ff ff ff f7 d8 64 89 01 48 [ 80.057633][ T6205] RSP: 002b:00007fc36066d0b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 80.057644][ T6205] RAX: ffffffffffffffda RBX: 00007fc35f9abf80 RCX: 00007fc35f86d079 [ 80.057652][ T6205] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 80.057659][ T6205] RBP: 00007fc36066d120 R08: 0000000000000000 R09: 0000000000000000 [ 80.057666][ T6205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 80.057672][ T6205] R13: 000000000000000b R14: 00007fc35f9abf80 R15: 00007ffe6faa0ea8 [ 80.057681][ T6205] [ 81.754006][ T5135] Bluetooth: hci0: command tx timeout 2026/01/27 07:26:20 executed programs: 3 [ 86.798461][ T6214] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811c023da8 (size 576): comm "syz-executor.0", pid 6205, jiffies 4294945245 hex dump (first 32 bytes): 3c 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 <............... 30 00 7f 0a 81 88 ff ff c0 3d 02 1c 81 88 ff ff 0........=...... backtrace (crc 6b321ade): kmem_cache_alloc_noprof+0x412/0x580 radix_tree_node_alloc.constprop.0+0x66/0x180 radix_tree_insert+0x140/0x390 qrtr_node_enqueue+0x59d/0x620 qrtr_bcast_enqueue+0x65/0xe0 qrtr_sendmsg+0x232/0x460 sock_write_iter+0x295/0x2b0 vfs_write+0x3ac/0x730 ksys_write+0x141/0x170 do_syscall_64+0xa4/0xf80 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88811c01d240 (size 576): comm "syz-executor.0", pid 6205, jiffies 4294945245 hex dump (first 32 bytes): 36 0f 01 00 00 00 00 00 a8 3d 02 1c 81 88 ff ff 6........=...... 30 00 7f 0a 81 88 ff ff 58 d2 01 1c 81 88 ff ff 0.......X....... backtrace (crc 4b95fdef): kmem_cache_alloc_noprof+0x412/0x580 radix_tree_node_alloc.constprop.0+0x66/0x180 radix_tree_insert+0x140/0x390 qrtr_node_enqueue+0x59d/0x620 qrtr_bcast_enqueue+0x65/0xe0 qrtr_sendmsg+0x232/0x460 sock_write_iter+0x295/0x2b0 vfs_write+0x3ac/0x730 ksys_write+0x141/0x170 do_syscall_64+0xa4/0xf80 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88811c01b918 (size 576): comm "syz-executor.0", pid 6205, jiffies 4294945245 hex dump (first 32 bytes): 30 3f 01 00 00 00 00 00 40 d2 01 1c 81 88 ff ff 0?......@....... 30 00 7f 0a 81 88 ff ff 30 b9 01 1c 81 88 ff ff 0.......0....... backtrace (crc ba9c5926): kmem_cache_alloc_noprof+0x412/0x580 radix_tree_node_alloc.constprop.0+0x66/0x180 radix_tree_insert+0x140/0x390 qrtr_node_enqueue+0x59d/0x620 qrtr_bcast_enqueue+0x65/0xe0 qrtr_sendmsg+0x232/0x460 sock_write_iter+0x295/0x2b0 vfs_write+0x3ac/0x730 ksys_write+0x141/0x170 do_syscall_64+0xa4/0xf80 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88811c026000 (size 576): comm "syz-executor.0", pid 6205, jiffies 4294945245 hex dump (first 32 bytes): 2a 3f 01 00 00 00 00 00 18 b9 01 1c 81 88 ff ff *?.............. 30 00 7f 0a 81 88 ff ff 18 60 02 1c 81 88 ff ff 0........`...... backtrace (crc 94145e1d): kmem_cache_alloc_noprof+0x412/0x580 radix_tree_node_alloc.constprop.0+0x66/0x180 radix_tree_insert+0x140/0x390 qrtr_node_enqueue+0x59d/0x620 qrtr_bcast_enqueue+0x65/0xe0 qrtr_sendmsg+0x232/0x460 sock_write_iter+0x295/0x2b0 vfs_write+0x3ac/0x730 ksys_write+0x141/0x170 do_syscall_64+0xa4/0xf80 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88811c026248 (size 576): comm "syz-executor.0", pid 6205, jiffies 4294945245 hex dump (first 32 bytes): 24 3f 00 00 00 00 00 00 00 60 02 1c 81 88 ff ff $?.......`...... 30 00 7f 0a 81 88 ff ff 60 62 02 1c 81 88 ff ff 0.......`b...... backtrace (crc 6de2bf89): kmem_cache_alloc_noprof+0x412/0x580 radix_tree_node_alloc.constprop.0+0x66/0x180 radix_tree_insert+0x140/0x390 qrtr_node_enqueue+0x59d/0x620 qrtr_bcast_enqueue+0x65/0xe0 qrtr_sendmsg+0x232/0x460 sock_write_iter+0x295/0x2b0 vfs_write+0x3ac/0x730 ksys_write+0x141/0x170 do_syscall_64+0xa4/0xf80 entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.516265][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.555262][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.615173][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.685409][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.749824][ T12] bridge_slave_1: left allmulticast mode [ 93.755572][ T12] bridge_slave_1: left promiscuous mode [ 93.761294][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.774360][ T12] bridge_slave_0: left allmulticast mode [ 93.780013][ T12] bridge_slave_0: left promiscuous mode [ 93.785996][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.844916][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 93.854438][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 93.863539][ T12] bond0 (unregistering): Released all slaves [ 93.925191][ T12] hsr_slave_0: left promiscuous mode [ 93.930686][ T12] hsr_slave_1: left promiscuous mode [ 93.936295][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 93.943759][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 93.951222][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 93.959080][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 93.967409][ T12] veth1_macvtap: left promiscuous mode [ 93.972895][ T12] veth0_macvtap: left promiscuous mode [ 93.978526][ T12] veth1_vlan: left promiscuous mode [ 93.983957][ T12] veth0_vlan: left promiscuous mode [ 94.007733][ T12] team0 (unregistering): Port device team_slave_1 removed [ 94.017461][ T12] team0 (unregistering): Port device team_slave_0 removed