Warning: Permanently added '10.128.1.17' (ED25519) to the list of known hosts.
2023/12/18 01:24:38 ignoring optional flag "sandboxArg"="0"
2023/12/18 01:24:38 parsed 1 programs
2023/12/18 01:24:45 executed programs: 0
[ 66.406769][ T5379] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 66.442211][ T4432] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 66.449399][ T4432] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 66.456642][ T4432] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 66.463951][ T4432] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 66.471202][ T4432] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 66.478384][ T4432] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 66.551353][ T5388] chnl_net:caif_netlink_parms(): no params data found
[ 66.586034][ T5388] bridge0: port 1(bridge_slave_0) entered blocking state
[ 66.593188][ T5388] bridge0: port 1(bridge_slave_0) entered disabled state
[ 66.600421][ T5388] bridge_slave_0: entered allmulticast mode
[ 66.606934][ T5388] bridge_slave_0: entered promiscuous mode
[ 66.614011][ T5388] bridge0: port 2(bridge_slave_1) entered blocking state
[ 66.621190][ T5388] bridge0: port 2(bridge_slave_1) entered disabled state
[ 66.628420][ T5388] bridge_slave_1: entered allmulticast mode
[ 66.634930][ T5388] bridge_slave_1: entered promiscuous mode
[ 66.651763][ T5388] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 66.662150][ T5388] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 66.681580][ T5388] team0: Port device team_slave_0 added
[ 66.688396][ T5388] team0: Port device team_slave_1 added
[ 66.703831][ T5388] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 66.710894][ T5388] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 66.737009][ T5388] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 66.749179][ T5388] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 66.756415][ T5388] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 66.783245][ T5388] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 66.808540][ T5388] hsr_slave_0: entered promiscuous mode
[ 66.814831][ T5388] hsr_slave_1: entered promiscuous mode
[ 67.417119][ T5388] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 67.426300][ T5388] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 67.435843][ T5388] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 67.445439][ T5388] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 67.465751][ T5388] bridge0: port 2(bridge_slave_1) entered blocking state
[ 67.473583][ T5388] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 67.481342][ T5388] bridge0: port 1(bridge_slave_0) entered blocking state
[ 67.488723][ T5388] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 67.540779][ T5388] 8021q: adding VLAN 0 to HW filter on device bond0
[ 67.555080][ T1775] bridge0: port 1(bridge_slave_0) entered disabled state
[ 67.563439][ T1775] bridge0: port 2(bridge_slave_1) entered disabled state
[ 67.576407][ T5388] 8021q: adding VLAN 0 to HW filter on device team0
[ 67.588180][ T1775] bridge0: port 1(bridge_slave_0) entered blocking state
[ 67.595356][ T1775] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 67.622475][ T1775] bridge0: port 2(bridge_slave_1) entered blocking state
[ 67.629620][ T1775] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 67.700783][ T5388] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 67.732053][ T5388] veth0_vlan: entered promiscuous mode
[ 67.742225][ T5388] veth1_vlan: entered promiscuous mode
[ 67.766433][ T5388] veth0_macvtap: entered promiscuous mode
[ 67.775386][ T5388] veth1_macvtap: entered promiscuous mode
[ 67.791213][ T5388] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 67.805053][ T5388] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 67.816307][ T5388] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 67.825646][ T5388] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 67.835367][ T5388] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 67.844781][ T5388] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 67.884313][ T1082] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 67.895894][ T1082] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 67.913735][ T1082] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 67.922160][ T1082] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 67.949575][ T5519] FAULT_INJECTION: forcing a failure.
[ 67.949575][ T5519] name failslab, interval 1, probability 0, space 0, times 1
[ 67.962488][ T5519] CPU: 0 PID: 5519 Comm: syz-executor.0 Not tainted 6.7.0-rc6-syzkaller-gceb6a6f023fd #0
[ 67.972309][ T5519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 67.982464][ T5519] Call Trace:
[ 67.985742][ T5519]
[ 67.988680][ T5519] dump_stack_lvl+0x72/0xa0
[ 67.993291][ T5519] should_fail_ex+0x14e/0x160
[ 67.997990][ T5519] should_failslab+0x9/0x20
[ 68.002588][ T5519] kmem_cache_alloc+0x47/0x430
[ 68.007417][ T5519] ? radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[ 68.013859][ T5519] ? __link_object+0x144/0x1c0
[ 68.018736][ T5519] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[ 68.025007][ T5519] radix_tree_insert+0x14f/0x360
[ 68.029967][ T5519] qrtr_node_enqueue+0x57d/0x630
[ 68.035017][ T5519] ? __skb_clone+0x7a/0x140
[ 68.039542][ T5519] qrtr_bcast_enqueue+0x66/0xd0
[ 68.044414][ T5519] qrtr_sendmsg+0x232/0x450
[ 68.048934][ T5519] ? qrtr_endpoint_unregister+0x2d0/0x2d0
[ 68.054667][ T5519] __sock_sendmsg+0x52/0xa0
[ 68.059190][ T5519] sock_write_iter+0xfb/0x180
[ 68.063885][ T5519] vfs_write+0x327/0x590
[ 68.068139][ T5519] ksys_write+0x13b/0x170
[ 68.072482][ T5519] do_syscall_64+0x3f/0x110
[ 68.077003][ T5519] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 68.082914][ T5519] RIP: 0033:0x7fdb72e7cae9
[ 68.087328][ T5519] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 68.106944][ T5519] RSP: 002b:00007fdb721fe0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 68.115361][ T5519] RAX: ffffffffffffffda RBX: 00007fdb72f9bf80 RCX: 00007fdb72e7cae9
[ 68.123515][ T5519] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
[ 68.131578][ T5519] RBP: 00007fdb721fe120 R08: 0000000000000000 R09: 0000000000000000
[ 68.139684][ T5519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 68.147672][ T5519] R13: 000000000000000b R14: 00007fdb72f9bf80 R15: 00007fff52a59b08
[ 68.155652][ T5519]
[ 68.539689][ T4432] Bluetooth: hci0: command 0x0409 tx timeout
[ 70.141049][ T1229] ieee802154 phy0 wpan0: encryption failed: -22
[ 70.147340][ T1229] ieee802154 phy1 wpan1: encryption failed: -22
[ 70.153891][ T2508] cfg80211: failed to load regulatory.db
[ 70.619748][ T4432] Bluetooth: hci0: command 0x041b tx timeout
[ 72.700584][ T4432] Bluetooth: hci0: command 0x040f tx timeout
2023/12/18 01:24:52 executed programs: 1
[ 74.720745][ T5750] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[ 74.779744][ T4432] Bluetooth: hci0: command 0x0419 tx timeout
BUG: memory leak
unreferenced object 0xffff88810bd95da8 (size 576):
comm "syz-executor.0", pid 5519, jiffies 4294944036 (age 13.830s)
hex dump (first 32 bytes):
3c 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 <...............
30 76 40 19 81 88 ff ff c0 5d d9 0b 81 88 ff ff 0v@......]......
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x57d/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b
BUG: memory leak
unreferenced object 0xffff888108eb4000 (size 576):
comm "syz-executor.0", pid 5519, jiffies 4294944036 (age 13.830s)
hex dump (first 32 bytes):
36 0f 01 00 00 00 00 00 a8 5d d9 0b 81 88 ff ff 6........]......
30 76 40 19 81 88 ff ff 18 40 eb 08 81 88 ff ff 0v@......@......
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x57d/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b
BUG: memory leak
unreferenced object 0xffff888108eb4248 (size 576):
comm "syz-executor.0", pid 5519, jiffies 4294944036 (age 13.830s)
hex dump (first 32 bytes):
30 3f 01 00 00 00 00 00 00 40 eb 08 81 88 ff ff 0?.......@......
30 76 40 19 81 88 ff ff 60 42 eb 08 81 88 ff ff 0v@.....`B......
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x57d/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b
BUG: memory leak
unreferenced object 0xffff888108eb4490 (size 576):
comm "syz-executor.0", pid 5519, jiffies 4294944036 (age 13.830s)
hex dump (first 32 bytes):
2a 3f 00 00 00 00 00 00 48 42 eb 08 81 88 ff ff *?......HB......
30 76 40 19 81 88 ff ff a8 44 eb 08 81 88 ff ff 0v@......D......
backtrace:
[] kmem_cache_alloc+0x298/0x430
[] radix_tree_node_alloc.constprop.0+0x7c/0x1a0
[] radix_tree_insert+0x14f/0x360
[] qrtr_node_enqueue+0x57d/0x630
[] qrtr_bcast_enqueue+0x66/0xd0
[] qrtr_sendmsg+0x232/0x450
[] __sock_sendmsg+0x52/0xa0
[] sock_write_iter+0xfb/0x180
[] vfs_write+0x327/0x590
[] ksys_write+0x13b/0x170
[] do_syscall_64+0x3f/0x110
[] entry_SYSCALL_64_after_hwframe+0x63/0x6b