Warning: Permanently added '10.128.10.9' (ED25519) to the list of known hosts. 2023/12/10 04:02:25 ignoring optional flag "sandboxArg"="0" 2023/12/10 04:02:25 parsed 1 programs 2023/12/10 04:02:33 executed programs: 0 [ 71.547045][ T5379] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 71.586080][ T4433] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.593321][ T4433] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.600666][ T4433] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.608419][ T4433] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.616195][ T4433] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.623280][ T4433] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.702809][ T5386] chnl_net:caif_netlink_parms(): no params data found [ 71.740134][ T5386] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.747319][ T5386] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.754554][ T5386] bridge_slave_0: entered allmulticast mode [ 71.761056][ T5386] bridge_slave_0: entered promiscuous mode [ 71.768293][ T5386] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.775387][ T5386] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.782696][ T5386] bridge_slave_1: entered allmulticast mode [ 71.789981][ T5386] bridge_slave_1: entered promiscuous mode [ 71.807506][ T5386] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.817943][ T5386] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.837775][ T5386] team0: Port device team_slave_0 added [ 71.847252][ T5386] team0: Port device team_slave_1 added [ 71.863981][ T5386] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 71.871561][ T5386] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 71.898609][ T5386] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 71.910192][ T5386] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 71.917614][ T5386] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 71.943804][ T5386] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 71.970338][ T5386] hsr_slave_0: entered promiscuous mode [ 71.976293][ T5386] hsr_slave_1: entered promiscuous mode [ 72.642484][ T5386] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 72.653031][ T5386] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 72.663367][ T5386] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 72.673406][ T5386] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 72.696508][ T5386] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.704034][ T5386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.711504][ T5386] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.718760][ T5386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.729617][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.738054][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.795709][ T5386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.813503][ T5386] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.825241][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.832576][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.846092][ T5048] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.853332][ T5048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.961066][ T5386] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.996635][ T5386] veth0_vlan: entered promiscuous mode [ 73.008371][ T5386] veth1_vlan: entered promiscuous mode [ 73.035586][ T5386] veth0_macvtap: entered promiscuous mode [ 73.045586][ T5386] veth1_macvtap: entered promiscuous mode [ 73.062915][ T5386] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.078859][ T5386] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.090469][ T5386] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.100546][ T5386] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.110628][ T5386] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.120329][ T5386] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.168769][ T736] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.176861][ T736] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.202983][ T5048] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.210916][ T5048] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.239201][ T5510] FAULT_INJECTION: forcing a failure. [ 73.239201][ T5510] name failslab, interval 1, probability 0, space 0, times 1 [ 73.253379][ T5510] CPU: 1 PID: 5510 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-dirty #0 [ 73.263213][ T5510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 73.273456][ T5510] Call Trace: [ 73.276918][ T5510] [ 73.280033][ T5510] dump_stack_lvl+0x72/0xa0 [ 73.284830][ T5510] should_fail_ex+0x14e/0x160 [ 73.289703][ T5510] should_failslab+0x9/0x20 [ 73.294387][ T5510] kmem_cache_alloc+0x47/0x430 [ 73.299175][ T5510] ? radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [ 73.305646][ T5510] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [ 73.312085][ T5510] ? __kmem_cache_alloc_node+0x2dd/0x3f0 [ 73.317828][ T5510] radix_tree_insert+0x14f/0x360 [ 73.322805][ T5510] qrtr_node_enqueue+0x512/0x6d0 [ 73.328022][ T5510] ? __skb_clone+0x7a/0x140 [ 73.332553][ T5510] qrtr_bcast_enqueue+0x66/0xd0 [ 73.337855][ T5510] qrtr_sendmsg+0x232/0x450 [ 73.342379][ T5510] ? qrtr_endpoint_unregister+0x2d0/0x2d0 [ 73.348290][ T5510] __sock_sendmsg+0x52/0xa0 [ 73.352914][ T5510] sock_write_iter+0xfb/0x180 [ 73.357790][ T5510] vfs_write+0x327/0x590 [ 73.362141][ T5510] ksys_write+0x13b/0x170 [ 73.366484][ T5510] do_syscall_64+0x3f/0x110 [ 73.371206][ T5510] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 73.377193][ T5510] RIP: 0033:0x7fe0a667cae9 [ 73.381708][ T5510] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 73.402027][ T5510] RSP: 002b:00007fe0a74ba0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 73.410450][ T5510] RAX: ffffffffffffffda RBX: 00007fe0a679bf80 RCX: 00007fe0a667cae9 [ 73.418532][ T5510] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 73.426514][ T5510] RBP: 00007fe0a74ba120 R08: 0000000000000000 R09: 0000000000000000 [ 73.434582][ T5510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 73.442824][ T5510] R13: 000000000000000b R14: 00007fe0a679bf80 R15: 00007ffc85dd60b8 [ 73.450809][ T5510] [ 73.454282][ T5510] r: -12 [ 73.675485][ T4433] Bluetooth: hci0: command 0x0409 tx timeout [ 75.354525][ T775] cfg80211: failed to load regulatory.db [ 75.754271][ T4433] Bluetooth: hci0: command 0x041b tx timeout [ 77.834471][ T4433] Bluetooth: hci0: command 0x040f tx timeout 2023/12/10 04:02:40 executed programs: 1 [ 79.914348][ T4433] Bluetooth: hci0: command 0x0419 tx timeout [ 80.035978][ T5748] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810e4ac248 (size 576): comm "syz-executor.0", pid 5510, jiffies 4294944556 (age 13.040s) hex dump (first 32 bytes): 3c 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 <............... 30 3c 8d 1a 81 88 ff ff 60 c2 4a 0e 81 88 ff ff 0<......`.J..... backtrace: [] kmem_cache_alloc+0x298/0x430 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [] radix_tree_insert+0x14f/0x360 [] qrtr_node_enqueue+0x512/0x6d0 [] qrtr_bcast_enqueue+0x66/0xd0 [] qrtr_sendmsg+0x232/0x450 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x327/0x590 [] ksys_write+0x13b/0x170 [] do_syscall_64+0x3f/0x110 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810e4ac000 (size 576): comm "syz-executor.0", pid 5510, jiffies 4294944556 (age 13.040s) hex dump (first 32 bytes): 36 0f 01 00 00 00 00 00 48 c2 4a 0e 81 88 ff ff 6.......H.J..... 30 3c 8d 1a 81 88 ff ff 18 c0 4a 0e 81 88 ff ff 0<........J..... backtrace: [] kmem_cache_alloc+0x298/0x430 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [] radix_tree_insert+0x14f/0x360 [] qrtr_node_enqueue+0x512/0x6d0 [] qrtr_bcast_enqueue+0x66/0xd0 [] qrtr_sendmsg+0x232/0x450 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x327/0x590 [] ksys_write+0x13b/0x170 [] do_syscall_64+0x3f/0x110 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810e4adda8 (size 576): comm "syz-executor.0", pid 5510, jiffies 4294944556 (age 13.040s) hex dump (first 32 bytes): 30 3f 01 00 00 00 00 00 00 c0 4a 0e 81 88 ff ff 0?........J..... 30 3c 8d 1a 81 88 ff ff c0 dd 4a 0e 81 88 ff ff 0<........J..... backtrace: [] kmem_cache_alloc+0x298/0x430 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [] radix_tree_insert+0x14f/0x360 [] qrtr_node_enqueue+0x512/0x6d0 [] qrtr_bcast_enqueue+0x66/0xd0 [] qrtr_sendmsg+0x232/0x450 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x327/0x590 [] ksys_write+0x13b/0x170 [] do_syscall_64+0x3f/0x110 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810e4da000 (size 576): comm "syz-executor.0", pid 5510, jiffies 4294944556 (age 13.040s) hex dump (first 32 bytes): 2a 3f 00 00 00 00 00 00 a8 dd 4a 0e 81 88 ff ff *?........J..... 30 3c 8d 1a 81 88 ff ff 18 a0 4d 0e 81 88 ff ff 0<........M..... backtrace: [] kmem_cache_alloc+0x298/0x430 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [] radix_tree_insert+0x14f/0x360 [] qrtr_node_enqueue+0x512/0x6d0 [] qrtr_bcast_enqueue+0x66/0xd0 [] qrtr_sendmsg+0x232/0x450 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x327/0x590 [] ksys_write+0x13b/0x170 [] do_syscall_64+0x3f/0x110 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b