Warning: Permanently added '10.128.1.67' (ED25519) to the list of known hosts.
2023/12/10 08:04:02 ignoring optional flag "sandboxArg"="0"
2023/12/10 08:04:02 parsed 1 programs
[ 75.451932][ T775] cfg80211: failed to load regulatory.db
2023/12/10 08:04:10 executed programs: 0
[ 75.745048][ T5380] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 75.785440][ T5039] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 75.792813][ T5039] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 75.800119][ T5039] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 75.807705][ T5039] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 75.814979][ T5039] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 75.822346][ T5039] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 75.901812][ T5388] chnl_net:caif_netlink_parms(): no params data found
[ 75.939805][ T5388] bridge0: port 1(bridge_slave_0) entered blocking state
[ 75.947060][ T5388] bridge0: port 1(bridge_slave_0) entered disabled state
[ 75.954410][ T5388] bridge_slave_0: entered allmulticast mode
[ 75.960980][ T5388] bridge_slave_0: entered promiscuous mode
[ 75.968618][ T5388] bridge0: port 2(bridge_slave_1) entered blocking state
[ 75.976098][ T5388] bridge0: port 2(bridge_slave_1) entered disabled state
[ 75.984392][ T5388] bridge_slave_1: entered allmulticast mode
[ 75.991075][ T5388] bridge_slave_1: entered promiscuous mode
[ 76.008832][ T5388] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 76.019426][ T5388] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 76.039853][ T5388] team0: Port device team_slave_0 added
[ 76.046962][ T5388] team0: Port device team_slave_1 added
[ 76.063487][ T5388] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 76.070559][ T5388] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 76.098053][ T5388] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 76.109783][ T5388] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 76.117054][ T5388] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 76.144071][ T5388] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 76.171948][ T5388] hsr_slave_0: entered promiscuous mode
[ 76.177975][ T5388] hsr_slave_1: entered promiscuous mode
[ 76.532603][ T5388] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 76.542508][ T5388] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 76.552657][ T5388] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 76.562415][ T5388] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 76.586256][ T5388] bridge0: port 2(bridge_slave_1) entered blocking state
[ 76.593717][ T5388] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 76.601350][ T5388] bridge0: port 1(bridge_slave_0) entered blocking state
[ 76.608958][ T5388] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 76.667182][ T5388] 8021q: adding VLAN 0 to HW filter on device bond0
[ 76.682344][ T2512] bridge0: port 1(bridge_slave_0) entered disabled state
[ 76.689979][ T2512] bridge0: port 2(bridge_slave_1) entered disabled state
[ 76.704721][ T5388] 8021q: adding VLAN 0 to HW filter on device team0
[ 76.717843][ T2512] bridge0: port 1(bridge_slave_0) entered blocking state
[ 76.725315][ T2512] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 76.746208][ T2512] bridge0: port 2(bridge_slave_1) entered blocking state
[ 76.754361][ T2512] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 76.860024][ T5388] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 76.902533][ T5388] veth0_vlan: entered promiscuous mode
[ 76.916208][ T5388] veth1_vlan: entered promiscuous mode
[ 76.944951][ T5388] veth0_macvtap: entered promiscuous mode
[ 76.954915][ T5388] veth1_macvtap: entered promiscuous mode
[ 76.974441][ T5388] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 76.989737][ T5388] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 77.002306][ T5388] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 77.011291][ T5388] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 77.022539][ T5388] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 77.031438][ T5388] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 77.089998][ T1090] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 77.107107][ T1090] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 77.129506][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 77.138095][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 77.177516][ T5482] mi: 0, sn: 1, qrtr_node_enqueue
[ 77.851873][ T4439] Bluetooth: hci0: command 0x0409 tx timeout
[ 79.931699][ T4439] Bluetooth: hci0: command 0x041b tx timeout
[ 82.021696][ T4439] Bluetooth: hci0: command 0x040f tx timeout
2023/12/10 08:04:17 executed programs: 1
[ 82.959078][ T5751] mi: 0, sn: 1, qrtr_node_enqueue
[ 82.976065][ T5753] mi: 0, sn: 1, qrtr_node_enqueue
[ 82.981360][ T5753] FAULT_INJECTION: forcing a failure.
[ 82.981360][ T5753] name failslab, interval 1, probability 0, space 0, times 0
[ 82.994179][ T5753] CPU: 1 PID: 5753 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-dirty #0
[ 83.003983][ T5753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[ 83.014307][ T5753] Call Trace:
[ 83.017583][ T5753]
[ 83.020809][ T5753] dump_stack_lvl+0x72/0xa0
[ 83.025423][ T5753] should_fail_ex+0x14e/0x160
[ 83.030115][ T5753] should_failslab+0x9/0x20
[ 83.034786][ T5753] kmem_cache_alloc+0x47/0x430
[ 83.039556][ T5753] ? radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[ 83.046188][ T5753] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[ 83.052571][ T5753] radix_tree_insert+0x14f/0x360
[ 83.057543][ T5753] qrtr_node_enqueue+0x5d0/0x6a0
[ 83.062578][ T5753] ? __skb_clone+0x7a/0x140
[ 83.067082][ T5753] qrtr_bcast_enqueue+0x66/0xd0
[ 83.071941][ T5753] qrtr_sendmsg+0x232/0x450
[ 83.076461][ T5753] ? qrtr_endpoint_unregister+0x2d0/0x2d0
[ 83.082381][ T5753] __sock_sendmsg+0x52/0xa0
[ 83.086892][ T5753] sock_write_iter+0xfb/0x180
[ 83.091661][ T5753] vfs_write+0x327/0x590
[ 83.096171][ T5753] ksys_write+0x13b/0x170
[ 83.100494][ T5753] do_syscall_64+0x3f/0x110
[ 83.105000][ T5753] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 83.111164][ T5753] RIP: 0033:0x7f52dcc7cae9
[ 83.115772][ T5753] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 83.135507][ T5753] RSP: 002b:00007f52dd9580c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 83.143923][ T5753] RAX: ffffffffffffffda RBX: 00007f52dcd9bf80 RCX: 00007f52dcc7cae9
[ 83.152062][ T5753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
[ 83.160177][ T5753] RBP: 00007f52dd958120 R08: 0000000000000000 R09: 0000000000000000
[ 83.168301][ T5753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 83.176269][ T5753] R13: 000000000000000b R14: 00007f52dcd9bf80 R15: 00007ffec9193508
[ 83.184694][ T5753]
[ 83.187914][ T5753] r: -12, k: 18446744073709551614, f: ffff88810c143ae0, qrtr_tx_wait
[ 84.091693][ T4439] Bluetooth: hci0: command 0x0419 tx timeout
2023/12/10 08:04:23 executed programs: 3
[ 88.780054][ T5757] mi: 0, sn: 1, qrtr_node_enqueue
[ 88.798201][ T5759] mi: 0, sn: 1, qrtr_node_enqueue
[ 89.997136][ T5760] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff88810b920000 (size 576):
comm "syz-executor.0", pid 5753, jiffies 4294945520 (age 13.500s)
hex dump (first 32 bytes):
3c 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 <...............
30 79 97 0c 81 88 ff ff 18 00 92 0b 81 88 ff ff 0y..............
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x5d0/0x6a0
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b
BUG: memory leak
unreferenced object 0xffff88810b920248 (size 576):
comm "syz-executor.0", pid 5753, jiffies 4294945520 (age 13.500s)
hex dump (first 32 bytes):
36 0f 01 00 00 00 00 00 00 00 92 0b 81 88 ff ff 6...............
30 79 97 0c 81 88 ff ff 60 02 92 0b 81 88 ff ff 0y......`.......
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x5d0/0x6a0
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b
BUG: memory leak
unreferenced object 0xffff88810b920490 (size 576):
comm "syz-executor.0", pid 5753, jiffies 4294945520 (age 13.500s)
hex dump (first 32 bytes):
30 3f 01 00 00 00 00 00 48 02 92 0b 81 88 ff ff 0?......H.......
30 79 97 0c 81 88 ff ff a8 04 92 0b 81 88 ff ff 0y..............
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x5d0/0x6a0
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b
BUG: memory leak
unreferenced object 0xffff88810b9206d8 (size 576):
comm "syz-executor.0", pid 5753, jiffies 4294945520 (age 13.500s)
hex dump (first 32 bytes):
2a 3f 00 00 00 00 00 00 90 04 92 0b 81 88 ff ff *?..............
30 79 97 0c 81 88 ff ff f0 06 92 0b 81 88 ff ff 0y..............
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x5d0/0x6a0
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b