Warning: Permanently added '10.128.1.185' (ED25519) to the list of known hosts. 2023/08/09 13:25:59 ignoring optional flag "sandboxArg"="0" 2023/08/09 13:25:59 parsed 1 programs [ 39.643548][ T3049] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k SS 2023/08/09 13:25:59 executed programs: 0 [ 39.743924][ T3058] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.745761][ T3058] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.747687][ T3058] device bridge_slave_0 entered promiscuous mode [ 39.749728][ T3058] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.751546][ T3058] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.753442][ T3058] device bridge_slave_1 entered promiscuous mode [ 39.851301][ T3058] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.853071][ T3058] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.854863][ T3058] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.856609][ T3058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.024502][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.026558][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.028646][ T2505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.030781][ T2505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.053237][ T90] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.055420][ T90] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.057234][ T90] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.059162][ T90] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.061399][ T90] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.063248][ T90] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.065116][ T90] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.067107][ T90] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.259202][ T90] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.284877][ T3058] device veth0_vlan entered promiscuous mode [ 40.287128][ T3058] device veth1_vlan entered promiscuous mode [ 40.289617][ T2505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.291772][ T2505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.293677][ T2505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.295548][ T2505] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 40.297551][ T2505] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 40.301465][ T90] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.303725][ T3058] device veth0_macvtap entered promiscuous mode [ 40.331623][ T2505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.333705][ T2505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.335884][ T2505] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 2023/08/09 13:26:04 executed programs: 625 [ 45.819948][ C0] ------------[ cut here ]------------ [ 45.821524][ C0] WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x280/0x288 [ 45.823967][ C0] Modules linked in: [ 45.824969][ C0] CPU: 0 PID: 14 Comm: ksoftirqd/0 Not tainted 6.1.44-syzkaller #0 [ 45.827077][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 45.829713][ C0] pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 45.831723][ C0] pc : inet_sock_destruct+0x280/0x288 [ 45.833165][ C0] lr : inet_sock_destruct+0x280/0x288 [ 45.834551][ C0] sp : ffff80000d4fbc60 [ 45.835568][ C0] x29: ffff80000d4fbc60 x28: ffff80000c0c5360 x27: 0000000000000001 [ 45.837622][ C0] x26: 0000000000000000 x25: 000000000000000a x24: ffff0000ca2af0d8 [ 45.839625][ C0] x23: ffff80000c1d7610 x22: ffff80000ae2e388 x21: ffff0000ca2aed60 [ 45.841775][ C0] x20: 0000000000000d00 x19: ffff0000ca2aec00 x18: ffff80000ae2d2bc [ 45.843872][ C0] x17: 0000000000000000 x16: 0000000000000100 x15: 0000000000001ac3 [ 45.845876][ C0] x14: ffff80000d3c8000 x13: 0000000000001ab3 x12: ffff80000d18c000 [ 45.847928][ C0] x11: ff8080000a9a132c x10: 0000000000000000 x9 : ffff80000a9a132c [ 45.849981][ C0] x8 : ffff0000c01dcbc0 x7 : 0000000000000000 x6 : ffff8000081a19b8 [ 45.852085][ C0] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000002 [ 45.854200][ C0] x2 : 0000000000000000 x1 : 0000000000000d00 x0 : 0000000000000000 [ 45.856198][ C0] Call trace: [ 45.856993][ C0] inet_sock_destruct+0x280/0x288 [ 45.858356][ C0] inet6_sock_destruct+0x28/0x38 [ 45.859662][ C0] __sk_destruct+0x38/0x414 [ 45.860811][ C0] rcu_core+0x348/0x758 [ 45.861936][ C0] rcu_core_si+0x10/0x1c [ 45.862994][ C0] __do_softirq+0x100/0x2b4 [ 45.864179][ C0] run_ksoftirqd+0x3c/0x13c [ 45.865322][ C0] smpboot_thread_fn+0x174/0x39c [ 45.866638][ C0] kthread+0x120/0x14c [ 45.867721][ C0] ret_from_fork+0x10/0x20 [ 45.868839][ C0] ---[ end trace 0000000000000000 ]--- 2023/08/09 13:26:09 executed programs: 1378 2023/08/09 13:26:14 executed programs: 2129