DUID 00:04:8f:6f:85:01:bf:a7:cc:33:b0:df:c3:3c:8d:7f:9b:67 forked to background, child pid 3178 [ 11.875810][ T3179] 8021q: adding VLAN 0 to HW filter on device bond0 [ 11.879087][ T3179] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.77' (ECDSA) to the list of known hosts. 2022/08/25 09:41:11 ignoring optional flag "sandboxArg"="0" 2022/08/25 09:41:12 parsed 1 programs syzkaller login: [ 24.864054][ T3598] cgroup: Unknown subsys name 'net' [ 24.958697][ T3598] cgroup: Unknown subsys name 'rlimit' 2022/08/25 09:41:19 executed programs: 0 [ 32.273184][ T3598] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 33.397681][ T3607] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 33.404749][ T3607] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 33.411748][ T3607] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 33.418980][ T3607] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 33.426080][ T3607] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 33.433092][ T3607] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 33.461125][ T3605] chnl_net:caif_netlink_parms(): no params data found [ 33.478063][ T3605] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.485108][ T3605] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.492444][ T3605] device bridge_slave_0 entered promiscuous mode [ 33.499332][ T3605] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.506363][ T3605] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.513724][ T3605] device bridge_slave_1 entered promiscuous mode [ 33.524476][ T3605] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.534200][ T3605] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.546839][ T3605] team0: Port device team_slave_0 added [ 33.552872][ T3605] team0: Port device team_slave_1 added [ 33.561795][ T3605] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.568814][ T3605] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.594740][ T3605] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.605765][ T3605] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.612706][ T3605] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.638564][ T3605] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.653827][ T3605] device hsr_slave_0 entered promiscuous mode [ 33.660095][ T3605] device hsr_slave_1 entered promiscuous mode [ 33.686031][ T3605] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 33.693399][ T3605] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 33.700910][ T3605] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 33.708327][ T3605] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 33.718852][ T3605] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.725873][ T3605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.733125][ T3605] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.740156][ T3605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.758298][ T3605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.766748][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.774382][ T3613] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.782468][ T3613] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.790018][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 33.798523][ T3605] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.807214][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.815302][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.822321][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.829641][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.837784][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.844795][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.854790][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 33.865273][ T3605] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 33.875655][ T3605] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.887311][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 33.894760][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 33.902898][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.910921][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.919589][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 33.929542][ T3605] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.936704][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 33.944013][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 33.977027][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.985377][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.993663][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.001079][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.008863][ T3605] device veth0_vlan entered promiscuous mode [ 34.016057][ T3605] device veth1_vlan entered promiscuous mode [ 34.025513][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 34.033170][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 34.040939][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.049650][ T3605] device veth0_macvtap entered promiscuous mode [ 34.056574][ T3605] device veth1_macvtap entered promiscuous mode [ 34.065594][ T3605] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.072821][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.081422][ T3614] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 34.090150][ T3605] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.097568][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.106412][ T3605] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.115149][ T3605] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.123897][ T3605] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.132760][ T3605] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.477053][ T25] Bluetooth: hci0: command 0x0409 tx timeout [ 37.556864][ T3614] Bluetooth: hci0: command 0x041b tx timeout 2022/08/25 09:41:26 executed programs: 1 [ 39.636698][ T3342] Bluetooth: hci0: command 0x040f tx timeout [ 41.716698][ T3342] Bluetooth: hci0: command 0x0419 tx timeout 2022/08/25 09:41:31 executed programs: 3 2022/08/25 09:41:37 executed programs: 5 2022/08/25 09:41:42 executed programs: 7 [ 56.548334][ T3652] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888114034a00 (size 256): comm "syz-executor.0", pid 3640, jiffies 4294942269 (age 12.750s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ backtrace: [] do_seccomp+0x195/0x1240 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffffc90002159000 (size 4096): comm "syz-executor.0", pid 3640, jiffies 4294942269 (age 12.750s) hex dump (first 32 bytes): 01 00 03 00 00 00 00 00 00 00 00 00 05 00 00 00 ................ 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __vmalloc_node_range+0xb3f/0xbd0 [] __vmalloc+0x49/0x50 [] bpf_prog_alloc_no_stats+0x38/0x250 [] bpf_prog_alloc+0x26/0x120 [] bpf_prog_create_from_user+0x66/0x1a0 [] do_seccomp+0x1dd/0x1240 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881140c2c00 (size 1024): comm "syz-executor.0", pid 3640, jiffies 4294942269 (age 12.750s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] bpf_prog_alloc_no_stats+0xb9/0x250 [] bpf_prog_alloc+0x26/0x120 [] bpf_prog_create_from_user+0x66/0x1a0 [] do_seccomp+0x1dd/0x1240 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88811415c940 (size 32): comm "syz-executor.0", pid 3640, jiffies 4294942269 (age 12.750s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 40 71 57 10 81 88 ff ff ........@qW..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] bpf_prog_store_orig_filter+0x33/0xa0 [] bpf_prog_create_from_user+0xf6/0x1a0 [] do_seccomp+0x1dd/0x1240 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888110577140 (size 32): comm "syz-executor.0", pid 3640, jiffies 4294942269 (age 12.750s) hex dump (first 32 bytes): 06 00 04 00 00 00 ff 7f 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemdup+0x23/0x50 [] bpf_prog_store_orig_filter+0x5e/0xa0 [] bpf_prog_create_from_user+0xf6/0x1a0 [] do_seccomp+0x1dd/0x1240 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd