Warning: Permanently added '10.128.10.20' (ED25519) to the list of known hosts. 2024/02/26 01:52:51 ignoring optional flag "sandboxArg"="0" 2024/02/26 01:52:52 parsed 1 programs [ 70.158133][ T776] cfg80211: failed to load regulatory.db 2024/02/26 01:52:59 executed programs: 0 [ 73.222129][ T5393] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 73.260791][ T4445] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 73.268418][ T4445] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 73.275454][ T4445] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 73.283137][ T4445] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 73.290417][ T4445] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 73.297568][ T4445] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 73.371715][ T5403] chnl_net:caif_netlink_parms(): no params data found [ 73.406853][ T5403] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.414127][ T5403] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.421473][ T5403] bridge_slave_0: entered allmulticast mode [ 73.428160][ T5403] bridge_slave_0: entered promiscuous mode [ 73.435105][ T5403] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.442399][ T5403] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.449732][ T5403] bridge_slave_1: entered allmulticast mode [ 73.456489][ T5403] bridge_slave_1: entered promiscuous mode [ 73.473650][ T5403] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.485017][ T5403] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.504846][ T5403] team0: Port device team_slave_0 added [ 73.511728][ T5403] team0: Port device team_slave_1 added [ 73.527417][ T5403] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.534457][ T5403] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.561695][ T5403] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.573141][ T5403] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.580432][ T5403] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.607435][ T5403] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.633054][ T5403] hsr_slave_0: entered promiscuous mode [ 73.639076][ T5403] hsr_slave_1: entered promiscuous mode [ 73.949640][ T5403] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.960443][ T5403] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.969665][ T5403] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.978875][ T5403] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.998435][ T5403] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.005576][ T5403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.013111][ T5403] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.020503][ T5403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.066322][ T5403] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.080509][ T1661] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.089133][ T1661] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.101450][ T5403] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.113318][ T1661] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.120913][ T1661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.148700][ T1661] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.156203][ T1661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.230241][ T5403] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.261174][ T5403] veth0_vlan: entered promiscuous mode [ 74.271795][ T5403] veth1_vlan: entered promiscuous mode [ 74.294677][ T5403] veth0_macvtap: entered promiscuous mode [ 74.303593][ T5403] veth1_macvtap: entered promiscuous mode [ 74.320103][ T5403] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.332979][ T5403] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.343586][ T5403] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.353371][ T5403] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.363508][ T5403] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.373100][ T5403] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.417118][ T57] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.432549][ T57] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.451229][ T57] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.460046][ T57] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.494797][ T5524] FAULT_INJECTION: forcing a failure. [ 74.494797][ T5524] name failslab, interval 1, probability 0, space 0, times 1 [ 74.510492][ T5524] CPU: 1 PID: 5524 Comm: syz-executor.0 Not tainted 6.8.0-rc6-syzkaller-gd206a76d7d27 #0 [ 74.520407][ T5524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 74.530484][ T5524] Call Trace: [ 74.533861][ T5524] [ 74.536794][ T5524] dump_stack_lvl+0x72/0xa0 [ 74.541497][ T5524] should_fail_ex+0x14e/0x160 [ 74.546336][ T5524] should_failslab+0x9/0x20 [ 74.550855][ T5524] kmem_cache_alloc+0x251/0x310 [ 74.555839][ T5524] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [ 74.562189][ T5524] radix_tree_insert+0x14f/0x360 [ 74.567144][ T5524] qrtr_node_enqueue+0x57d/0x630 [ 74.572367][ T5524] ? __skb_clone+0x7a/0x140 [ 74.577065][ T5524] qrtr_bcast_enqueue+0x66/0xd0 [ 74.581935][ T5524] qrtr_sendmsg+0x232/0x450 [ 74.586462][ T5524] ? qrtr_endpoint_unregister+0x2d0/0x2d0 [ 74.592736][ T5524] __sock_sendmsg+0x52/0xa0 [ 74.597346][ T5524] sock_write_iter+0xfb/0x180 [ 74.602050][ T5524] vfs_write+0x367/0x6c0 [ 74.606542][ T5524] ksys_write+0x13b/0x170 [ 74.610979][ T5524] do_syscall_64+0xad/0x1d0 [ 74.615502][ T5524] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 74.621499][ T5524] RIP: 0033:0x7f40d1c7cae9 [ 74.626021][ T5524] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 74.646082][ T5524] RSP: 002b:00007f40d2ab10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 74.655045][ T5524] RAX: ffffffffffffffda RBX: 00007f40d1d9bf80 RCX: 00007f40d1c7cae9 [ 74.663023][ T5524] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 74.671082][ T5524] RBP: 00007f40d2ab1120 R08: 0000000000000000 R09: 0000000000000000 [ 74.679142][ T5524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 74.687127][ T5524] R13: 000000000000000b R14: 00007f40d1d9bf80 R15: 00007ffe416073c8 [ 74.695112][ T5524] [ 75.347951][ T4445] Bluetooth: hci0: command 0x0409 tx timeout [ 77.428052][ T4445] Bluetooth: hci0: command 0x041b tx timeout [ 79.508176][ T4445] Bluetooth: hci0: command 0x040f tx timeout 2024/02/26 01:53:07 executed programs: 1 [ 81.575088][ T5771] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 81.587985][ T4445] Bluetooth: hci0: command 0x0419 tx timeout BUG: memory leak unreferenced object 0xffff88810d3de000 (size 576): comm "syz-executor.0", pid 5524, jiffies 4294944690 hex dump (first 32 bytes): 3c 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 <............... 30 e6 cf 1c 81 88 ff ff 18 e0 3d 0d 81 88 ff ff 0.........=..... backtrace (crc 7f6dd5f5): [] kmem_cache_alloc+0x26f/0x310 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [] radix_tree_insert+0x14f/0x360 [] qrtr_node_enqueue+0x57d/0x630 [] qrtr_bcast_enqueue+0x66/0xd0 [] qrtr_sendmsg+0x232/0x450 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x367/0x6c0 [] ksys_write+0x13b/0x170 [] do_syscall_64+0xad/0x1d0 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810d3de248 (size 576): comm "syz-executor.0", pid 5524, jiffies 4294944690 hex dump (first 32 bytes): 36 0f 01 00 00 00 00 00 00 e0 3d 0d 81 88 ff ff 6.........=..... 30 e6 cf 1c 81 88 ff ff 60 e2 3d 0d 81 88 ff ff 0.......`.=..... backtrace (crc 66264d82): [] kmem_cache_alloc+0x26f/0x310 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [] radix_tree_insert+0x14f/0x360 [] qrtr_node_enqueue+0x57d/0x630 [] qrtr_bcast_enqueue+0x66/0xd0 [] qrtr_sendmsg+0x232/0x450 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x367/0x6c0 [] ksys_write+0x13b/0x170 [] do_syscall_64+0xad/0x1d0 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810d3de490 (size 576): comm "syz-executor.0", pid 5524, jiffies 4294944690 hex dump (first 32 bytes): 30 3f 01 00 00 00 00 00 48 e2 3d 0d 81 88 ff ff 0?......H.=..... 30 e6 cf 1c 81 88 ff ff a8 e4 3d 0d 81 88 ff ff 0.........=..... backtrace (crc f7c757cb): [] kmem_cache_alloc+0x26f/0x310 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [] radix_tree_insert+0x14f/0x360 [] qrtr_node_enqueue+0x57d/0x630 [] qrtr_bcast_enqueue+0x66/0xd0 [] qrtr_sendmsg+0x232/0x450 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x367/0x6c0 [] ksys_write+0x13b/0x170 [] do_syscall_64+0xad/0x1d0 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b BUG: memory leak unreferenced object 0xffff88810d3de6d8 (size 576): comm "syz-executor.0", pid 5524, jiffies 4294944690 hex dump (first 32 bytes): 2a 3f 00 00 00 00 00 00 90 e4 3d 0d 81 88 ff ff *?........=..... 30 e6 cf 1c 81 88 ff ff f0 e6 3d 0d 81 88 ff ff 0.........=..... backtrace (crc c3e4f013): [] kmem_cache_alloc+0x26f/0x310 [] radix_tree_node_alloc.constprop.0+0x7c/0x1a0 [] radix_tree_insert+0x14f/0x360 [] qrtr_node_enqueue+0x57d/0x630 [] qrtr_bcast_enqueue+0x66/0xd0 [] qrtr_sendmsg+0x232/0x450 [] __sock_sendmsg+0x52/0xa0 [] sock_write_iter+0xfb/0x180 [] vfs_write+0x367/0x6c0 [] ksys_write+0x13b/0x170 [] do_syscall_64+0xad/0x1d0 [] entry_SYSCALL_64_after_hwframe+0x63/0x6b