Warning: Permanently added '10.128.0.213' (ED25519) to the list of known hosts.
2024/05/06 02:20:28 ignoring optional flag "sandboxArg"="0"
2024/05/06 02:20:28 parsed 1 programs
[ 70.244129][ T43] cfg80211: failed to load regulatory.db
2024/05/06 02:20:36 executed programs: 0
[ 72.133092][ T5419] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 72.177270][ T4484] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 72.185232][ T4484] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 72.192618][ T4484] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 72.200119][ T4484] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 72.207284][ T4484] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 72.214424][ T4484] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 72.287250][ T5427] chnl_net:caif_netlink_parms(): no params data found
[ 72.321828][ T5427] bridge0: port 1(bridge_slave_0) entered blocking state
[ 72.328924][ T5427] bridge0: port 1(bridge_slave_0) entered disabled state
[ 72.336041][ T5427] bridge_slave_0: entered allmulticast mode
[ 72.342561][ T5427] bridge_slave_0: entered promiscuous mode
[ 72.349495][ T5427] bridge0: port 2(bridge_slave_1) entered blocking state
[ 72.356558][ T5427] bridge0: port 2(bridge_slave_1) entered disabled state
[ 72.363778][ T5427] bridge_slave_1: entered allmulticast mode
[ 72.370270][ T5427] bridge_slave_1: entered promiscuous mode
[ 72.386720][ T5427] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 72.397235][ T5427] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 72.416433][ T5427] team0: Port device team_slave_0 added
[ 72.423170][ T5427] team0: Port device team_slave_1 added
[ 72.438195][ T5427] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 72.445416][ T5427] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 72.472436][ T5427] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 72.484072][ T5427] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 72.491129][ T5427] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 72.517452][ T5427] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 72.542747][ T5427] hsr_slave_0: entered promiscuous mode
[ 72.548654][ T5427] hsr_slave_1: entered promiscuous mode
[ 72.864026][ T5427] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 72.872954][ T5427] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 72.881908][ T5427] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 72.891626][ T5427] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 72.911557][ T5427] bridge0: port 2(bridge_slave_1) entered blocking state
[ 72.918710][ T5427] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 72.926179][ T5427] bridge0: port 1(bridge_slave_0) entered blocking state
[ 72.933426][ T5427] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 72.981636][ T5427] 8021q: adding VLAN 0 to HW filter on device bond0
[ 72.994656][ T1785] bridge0: port 1(bridge_slave_0) entered disabled state
[ 73.003485][ T1785] bridge0: port 2(bridge_slave_1) entered disabled state
[ 73.015307][ T5427] 8021q: adding VLAN 0 to HW filter on device team0
[ 73.028883][ T43] bridge0: port 1(bridge_slave_0) entered blocking state
[ 73.036064][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 73.048080][ T779] bridge0: port 2(bridge_slave_1) entered blocking state
[ 73.055343][ T779] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 73.144459][ T5427] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 73.174839][ T5427] veth0_vlan: entered promiscuous mode
[ 73.184696][ T5427] veth1_vlan: entered promiscuous mode
[ 73.207382][ T5427] veth0_macvtap: entered promiscuous mode
[ 73.216761][ T5427] veth1_macvtap: entered promiscuous mode
[ 73.233010][ T5427] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 73.245677][ T5427] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 73.256566][ T5427] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 73.265689][ T5427] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 73.275487][ T5427] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 73.284805][ T5427] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 73.333097][ T1043] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 73.347921][ T1043] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 73.367068][ T1043] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 73.375706][ T1043] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 74.239223][ T5077] Bluetooth: hci0: command tx timeout
[ 76.319312][ T5077] Bluetooth: hci0: command tx timeout
[ 78.409245][ T5077] Bluetooth: hci0: command tx timeout
2024/05/06 02:20:43 executed programs: 1
[ 79.019897][ T5789] FAULT_INJECTION: forcing a failure.
[ 79.019897][ T5789] name failslab, interval 1, probability 0, space 0, times 0
[ 79.032572][ T5789] CPU: 1 PID: 5789 Comm: syz-executor.0 Not tainted 6.9.0-rc7-syzkaller-gdd5a440a31fa #0
[ 79.042467][ T5789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
[ 79.052602][ T5789] Call Trace:
[ 79.055873][ T5789]
[ 79.058803][ T5789] dump_stack_lvl+0xab/0xe0
[ 79.063627][ T5789] should_fail_ex+0x14f/0x160
[ 79.068317][ T5789] should_failslab+0x9/0x20
[ 79.072908][ T5789] kmem_cache_alloc+0x253/0x310
[ 79.077768][ T5789] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[ 79.084022][ T5789] radix_tree_insert+0x14f/0x360
[ 79.088958][ T5789] qrtr_node_enqueue+0x584/0x630
[ 79.093993][ T5789] ? __skb_clone+0x7a/0x140
[ 79.098511][ T5789] qrtr_bcast_enqueue+0x66/0xd0
[ 79.103359][ T5789] qrtr_sendmsg+0x232/0x450
[ 79.107942][ T5789] ? __pfx_qrtr_bcast_enqueue+0x10/0x10
[ 79.113562][ T5789] sock_write_iter+0x25f/0x270
[ 79.118341][ T5789] vfs_write+0x369/0x6d0
[ 79.124318][ T5789] ksys_write+0x13f/0x170
[ 79.128644][ T5789] do_syscall_64+0xa0/0x1d0
[ 79.133142][ T5789] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 79.139037][ T5789] RIP: 0033:0x7fda3567cae9
[ 79.143435][ T5789] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 79.163284][ T5789] RSP: 002b:00007fda3630f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 79.171673][ T5789] RAX: ffffffffffffffda RBX: 00007fda3579bf80 RCX: 00007fda3567cae9
[ 79.179644][ T5789] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
[ 79.187606][ T5789] RBP: 00007fda3630f120 R08: 0000000000000000 R09: 0000000000000000
[ 79.195587][ T5789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 79.203543][ T5789] R13: 000000000000000b R14: 00007fda3579bf80 R15: 00007fffc6e4fc68
[ 79.211502][ T5789]
[ 80.479324][ T5077] Bluetooth: hci0: command tx timeout
2024/05/06 02:20:48 executed programs: 3
[ 85.261428][ T5800] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff88810c85d918 (size 576):
comm "syz-executor.0", pid 5789, jiffies 4294945134
hex dump (first 32 bytes):
3c 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 <...............
b0 34 ed 1b 81 88 ff ff 30 d9 85 0c 81 88 ff ff .4......0.......
backtrace (crc d56c0c5a):
[] kmem_cache_alloc+0x271/0x310
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x584/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] sock_write_iter+0x25f/0x270
[] vfs_write+0x369/0x6d0
[] ksys_write+0x13f/0x170
[] do_syscall_64+0xa0/0x1d0
[] entry_SYSCALL_64_after_hwframe+0x77/0x7f
BUG: memory leak
unreferenced object 0xffff88810c85db60 (size 576):
comm "syz-executor.0", pid 5789, jiffies 4294945134
hex dump (first 32 bytes):
36 0f 01 00 00 00 00 00 18 d9 85 0c 81 88 ff ff 6...............
b0 34 ed 1b 81 88 ff ff 78 db 85 0c 81 88 ff ff .4......x.......
backtrace (crc a52b67f9):
[] kmem_cache_alloc+0x271/0x310
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x584/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] sock_write_iter+0x25f/0x270
[] vfs_write+0x369/0x6d0
[] ksys_write+0x13f/0x170
[] do_syscall_64+0xa0/0x1d0
[] entry_SYSCALL_64_after_hwframe+0x77/0x7f
BUG: memory leak
unreferenced object 0xffff88810c85dda8 (size 576):
comm "syz-executor.0", pid 5789, jiffies 4294945134
hex dump (first 32 bytes):
30 3f 01 00 00 00 00 00 60 db 85 0c 81 88 ff ff 0?......`.......
b0 34 ed 1b 81 88 ff ff c0 dd 85 0c 81 88 ff ff .4..............
backtrace (crc ee1c6c11):
[] kmem_cache_alloc+0x271/0x310
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x584/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] sock_write_iter+0x25f/0x270
[] vfs_write+0x369/0x6d0
[] ksys_write+0x13f/0x170
[] do_syscall_64+0xa0/0x1d0
[] entry_SYSCALL_64_after_hwframe+0x77/0x7f
BUG: memory leak
unreferenced object 0xffff88810c85e000 (size 576):
comm "syz-executor.0", pid 5789, jiffies 4294945134
hex dump (first 32 bytes):
2a 3f 00 00 00 00 00 00 a8 dd 85 0c 81 88 ff ff *?..............
b0 34 ed 1b 81 88 ff ff 18 e0 85 0c 81 88 ff ff .4..............
backtrace (crc 4f7f6b1e):
[] kmem_cache_alloc+0x271/0x310
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x584/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] sock_write_iter+0x25f/0x270
[] vfs_write+0x369/0x6d0
[] ksys_write+0x13f/0x170
[] do_syscall_64+0xa0/0x1d0
[] entry_SYSCALL_64_after_hwframe+0x77/0x7f