Warning: Permanently added '10.128.10.37' (ECDSA) to the list of known hosts. 2019/11/07 14:46:10 fuzzer started 2019/11/07 14:46:11 dialing manager at 10.128.0.105:36923 2019/11/07 14:46:11 syscalls: 2553 2019/11/07 14:46:11 code coverage: enabled 2019/11/07 14:46:11 comparison tracing: enabled 2019/11/07 14:46:11 extra coverage: extra coverage is not supported by the kernel 2019/11/07 14:46:11 setuid sandbox: enabled 2019/11/07 14:46:11 namespace sandbox: enabled 2019/11/07 14:46:11 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/07 14:46:11 fault injection: enabled 2019/11/07 14:46:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/07 14:46:11 net packet injection: enabled 2019/11/07 14:46:11 net device setup: enabled 2019/11/07 14:46:11 concurrency sanitizer: enabled 2019/11/07 14:46:11 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/07 14:46:11 adding functions to KCSAN blacklist: '__hrtimer_run_queues' 14:46:13 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000665ff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) syzkaller login: [ 76.327209][ T7955] IPVS: ftp: loaded support on port[0] = 21 14:46:13 executing program 1: syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) epoll_create1(0x80000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff}) accept4$vsock_stream(r2, &(0x7f0000000740), 0x10, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x26, 0x0, 0x4, 0x20, {0x0, 0x0}, {0x3, 0xc, 0xd, 0x0, 0xffff, 0x3, "f2f2a35d"}, 0x0, 0x1, @fd=r3, 0x4}) r5 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6, 0x501000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu//.z1\x8c', 0x1ff) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="2321202e2f66696c6530202e2f6367726f75702e6e65742f73797a3100202e2f6367726f75702e6370752f2e797a3100204073797374656d5e20706f72743000202728407365637572697479232b5b207573657200205d206386ff6465765e63707573657473656c662547504c0a33e5d53c6170fc22cf15c1c61873b54884d55f9f74be9305d0097e7777a3757f89897750ed5ddb939da9cbdb487b0e710eeda73058c09ef1694239daa01f5f055c2e485b0942a32f5bff951d6c0a3b212600000000000000"], 0xc6) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80080, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) prctl$PR_SET_MM(0x23, 0xc12f356e2b198f51, &(0x7f0000ffb000/0x3000)=nil) r7 = add_key$user(&(0x7f0000000240)='user\x00', 0x0, &(0x7f00000003c0)="f1d6275ef617a6431d89429288e0ac455d00867174541165cd16bb6d1e0c518e99686266942a368982062f14bf14b371f7c145615ce8b80270dfb3cfb2b3ba99b194f601cb40eb1d7d5a61c930794e97bbf467400a2607be65ddd8e7d0e6e8ad3dbe1a058f0bfa935f8e000cfc89ab0a680ce1995c79c96d75ffed5fa0c3ea145c05b486edff5720e527ffa7fb16edc136bc8f270eeed4ad3842ae9f912c747bdbd65923ce3ffd193d15d09649f199b4a3133e8b44b04c2f554be4fc296fca5132726b13685477328045", 0xca, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000004c0)={r7, 0x0, 0xe}, 0x0, 0xffffffffffffffff, &(0x7f0000000500)="088237799872f22c7b66ac336315") r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000700)=0x8001, 0xfffffffffffffc5e) write$binfmt_script(r8, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0xbe) r9 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000540)={{0x10000b, 0x6}, 'port0\x00', 0x41, 0x11020, 0x7f, 0x3, 0x7fff, 0x3, 0x6f25, 0x0, 0x2, 0x8001}) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r10, 0x10e, 0x1, &(0x7f0000000000)=0xb, 0xee499dd7534c38ac) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r11, 0x10e, 0x1, &(0x7f0000000000)=0xb, 0xee499dd7534c38ac) r12 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x0, 0xffffffff}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, &(0x7f0000000100)={0x84, @local, 0x8000, 0x0, 'sh\x00', 0x4, 0x2, 0x74}, 0x2c) write$cgroup_subtree(r6, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000a40)=ANY=[@ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR, @ANYRES32=0x0, @ANYRES64=r10, @ANYBLOB="5564eb8b870ab7cd954cdacf18654e8109a1c94f38a67506bffcbb72cf09c68a03df9e47a25082a960aa2a36a3ba5f06f654507a58ca90d609404e88e59d3e8a7f13462209ab165d7dbacc371ddeb8d982354b324c22ae4f3453b2694ec9c6c08b23c9763c98eff52963a85d10c73d84799aa61a", @ANYRESOCT=r11], @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES64=r6, @ANYRES16], @ANYRESDEC=r12, @ANYRESDEC=r5, @ANYRES16, @ANYRES64, @ANYRESOCT=r4], @ANYRESOCT], 0x1f) syz_open_dev$evdev(&(0x7f0000000780)='/dev/input/event#\x00', 0x5, 0x4000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) [ 76.405568][ T7955] chnl_net:caif_netlink_parms(): no params data found [ 76.446590][ T7955] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.463505][ T7955] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.488857][ T7955] device bridge_slave_0 entered promiscuous mode [ 76.496407][ T7955] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.518850][ T7955] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.526594][ T7955] device bridge_slave_1 entered promiscuous mode [ 76.570692][ T7955] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.590296][ T7955] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.606101][ T7958] IPVS: ftp: loaded support on port[0] = 21 [ 76.623316][ T7955] team0: Port device team_slave_0 added [ 76.640730][ T7955] team0: Port device team_slave_1 added 14:46:13 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRES32=0x0], 0x1}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000600)={0x0, 0x0, 0x7, 'queue1\x00'}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYRES32=0x0], &(0x7f000095dffc)=0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1a, 0x1000) unshare(0x40000000) [ 76.721159][ T7955] device hsr_slave_0 entered promiscuous mode [ 76.799069][ T7955] device hsr_slave_1 entered promiscuous mode [ 76.886168][ T7960] IPVS: ftp: loaded support on port[0] = 21 [ 76.936402][ T7955] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.943555][ T7955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.950867][ T7955] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.957921][ T7955] bridge0: port 1(bridge_slave_0) entered forwarding state 14:46:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000002c0), r1, 0x0, 0x0, 0x1}}, 0x20) [ 77.117023][ T7958] chnl_net:caif_netlink_parms(): no params data found [ 77.208534][ T7955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.267460][ T7955] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.301025][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.320077][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.349133][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.390204][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 77.425260][ T7958] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.440089][ T7958] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.468919][ T7958] device bridge_slave_0 entered promiscuous mode [ 77.561205][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.581001][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.588089][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.640549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.669220][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.676280][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.742524][ T7958] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.760057][ T7958] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.789002][ T7958] device bridge_slave_1 entered promiscuous mode [ 77.830514][ T7987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.830709][ T7989] IPVS: ftp: loaded support on port[0] = 21 [ 77.849564][ T7987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.889590][ T7987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.929383][ T7987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.969772][ T7987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.009568][ T7987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.081701][ T7960] chnl_net:caif_netlink_parms(): no params data found [ 78.108519][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 78.121425][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.149738][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.182640][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.202301][ T7958] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:46:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = timerfd_create(0x0, 0x0) fstat(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) [ 78.250356][ T7958] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.281320][ T7955] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.312548][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.329465][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.410797][ T7958] team0: Port device team_slave_0 added [ 78.447913][ T7960] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.468926][ T7960] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.477144][ T7960] device bridge_slave_0 entered promiscuous mode [ 78.522627][ T7958] team0: Port device team_slave_1 added [ 78.548365][ T7960] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.585245][ T7960] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.620785][ T7960] device bridge_slave_1 entered promiscuous mode [ 78.658450][ T7989] chnl_net:caif_netlink_parms(): no params data found [ 78.771216][ T7958] device hsr_slave_0 entered promiscuous mode [ 78.821215][ T7958] device hsr_slave_1 entered promiscuous mode [ 78.840860][ T7958] debugfs: Directory 'hsr0' with parent '/' already present! [ 78.872769][ T7996] IPVS: ftp: loaded support on port[0] = 21 [ 78.927757][ T7960] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:46:15 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000665ff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 14:46:15 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000665ff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 78.968261][ T7960] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.993368][ T7989] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.025630][ T7989] bridge0: port 1(bridge_slave_0) entered disabled state 14:46:15 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000665ff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 79.079345][ T7989] device bridge_slave_0 entered promiscuous mode [ 79.176310][ T7989] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.198836][ T7989] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.234598][ T7989] device bridge_slave_1 entered promiscuous mode [ 79.298983][ T7960] team0: Port device team_slave_0 added [ 79.305685][ T7960] team0: Port device team_slave_1 added 14:46:16 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000665ff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 79.440839][ T7989] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.478087][ T7989] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.611432][ T7960] device hsr_slave_0 entered promiscuous mode [ 79.649081][ T7960] device hsr_slave_1 entered promiscuous mode 14:46:16 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000665ff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 79.691433][ T7960] debugfs: Directory 'hsr0' with parent '/' already present! [ 79.747125][ T8037] IPVS: ftp: loaded support on port[0] = 21 [ 79.934447][ T7996] chnl_net:caif_netlink_parms(): no params data found [ 79.972005][ T7989] team0: Port device team_slave_0 added [ 79.981587][ T7958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.057136][ T7989] team0: Port device team_slave_1 added [ 80.085497][ T7958] 8021q: adding VLAN 0 to HW filter on device team0 14:46:17 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000665ff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 80.222183][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 80.250809][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.359307][ T7987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 80.367828][ T7987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 80.431078][ T7987] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.438145][ T7987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.501476][ T7987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 14:46:17 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000665ff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 80.560609][ T7987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 80.620477][ T7987] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.627557][ T7987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.778456][ T8032] ================================================================== [ 80.786616][ T8032] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 80.794682][ T8032] [ 80.797023][ T8032] write to 0xffffffff861480a4 of 4 bytes by task 8034 on cpu 1: [ 80.804664][ T8032] tomoyo_supervisor+0x1c9/0xd20 [ 80.809616][ T8032] tomoyo_path_permission+0x121/0x160 [ 80.815000][ T8032] tomoyo_check_open_permission+0x2fd/0x320 [ 80.820897][ T8032] tomoyo_file_open+0x75/0x90 [ 80.825588][ T8032] security_file_open+0x69/0x210 [ 80.830526][ T8032] do_dentry_open+0x20a/0x8f0 [ 80.835205][ T8032] vfs_open+0x62/0x80 [ 80.839198][ T8032] path_openat+0xf73/0x36e0 [ 80.843706][ T8032] do_filp_open+0x11e/0x1b0 [ 80.848214][ T8032] do_sys_open+0x3b3/0x4f0 [ 80.852637][ T8032] __x64_sys_open+0x55/0x70 [ 80.857162][ T8032] do_syscall_64+0xcc/0x370 [ 80.861768][ T8032] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.867673][ T8032] [ 80.870013][ T8032] read to 0xffffffff861480a4 of 4 bytes by task 8032 on cpu 0: [ 80.877564][ T8032] tomoyo_supervisor+0x1b0/0xd20 [ 80.882515][ T8032] tomoyo_path_permission+0x121/0x160 [ 80.887893][ T8032] tomoyo_check_open_permission+0x2fd/0x320 [ 80.893789][ T8032] tomoyo_file_open+0x75/0x90 [ 80.898474][ T8032] security_file_open+0x69/0x210 [ 80.903416][ T8032] do_dentry_open+0x20a/0x8f0 [ 80.908095][ T8032] vfs_open+0x62/0x80 [ 80.912353][ T8032] path_openat+0xf73/0x36e0 [ 80.916862][ T8032] do_filp_open+0x11e/0x1b0 [ 80.921372][ T8032] do_sys_open+0x3b3/0x4f0 [ 80.925803][ T8032] __x64_sys_open+0x55/0x70 [ 80.930314][ T8032] do_syscall_64+0xcc/0x370 [ 80.934995][ T8032] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.940875][ T8032] [ 80.943201][ T8032] Reported by Kernel Concurrency Sanitizer on: [ 80.949366][ T8032] CPU: 0 PID: 8032 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 80.956124][ T8032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.966182][ T8032] ================================================================== [ 80.974255][ T8032] Kernel panic - not syncing: panic_on_warn set ... [ 80.980853][ T8032] CPU: 0 PID: 8032 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 80.987613][ T8032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.997675][ T8032] Call Trace: [ 81.000997][ T8032] dump_stack+0xf5/0x159 [ 81.005248][ T8032] panic+0x210/0x640 [ 81.009165][ T8032] ? vprintk_func+0x8d/0x140 [ 81.013765][ T8032] kcsan_report.cold+0xc/0xe [ 81.018462][ T8032] kcsan_setup_watchpoint+0x3fe/0x410 [ 81.026650][ T8032] __tsan_read4+0x145/0x1f0 [ 81.031182][ T8032] tomoyo_supervisor+0x1b0/0xd20 [ 81.036225][ T8032] ? tomoyo_path_matches_pattern+0xa1/0x160 [ 81.042142][ T8032] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 81.048395][ T8032] ? tomoyo_compare_name_union+0x4c/0xa0 [ 81.054047][ T8032] ? __read_once_size.constprop.0+0x12/0x20 [ 81.059958][ T8032] ? tomoyo_compare_name_union+0xa0/0xa0 [ 81.065610][ T8032] tomoyo_path_permission+0x121/0x160 [ 81.071004][ T8032] tomoyo_check_open_permission+0x2fd/0x320 [ 81.076943][ T8032] tomoyo_file_open+0x75/0x90 [ 81.081639][ T8032] security_file_open+0x69/0x210 [ 81.086599][ T8032] do_dentry_open+0x20a/0x8f0 [ 81.091289][ T8032] ? security_inode_permission+0xa5/0xc0 [ 81.096951][ T8032] vfs_open+0x62/0x80 [ 81.100949][ T8032] path_openat+0xf73/0x36e0 [ 81.105481][ T8032] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 81.111397][ T8032] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 81.117328][ T8032] ? __read_once_size+0x41/0xe0 [ 81.122188][ T8032] do_filp_open+0x11e/0x1b0 [ 81.126715][ T8032] ? __alloc_fd+0x2ef/0x3b0 [ 81.131248][ T8032] do_sys_open+0x3b3/0x4f0 [ 81.135681][ T8032] __x64_sys_open+0x55/0x70 [ 81.140210][ T8032] do_syscall_64+0xcc/0x370 [ 81.144735][ T8032] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 81.150631][ T8032] RIP: 0033:0x7f9f0b4e2120 [ 81.155059][ T8032] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 81.174676][ T8032] RSP: 002b:00007ffcea3d22d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 81.183091][ T8032] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f9f0b4e2120 [ 81.191068][ T8032] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f9f0b9b0d00 [ 81.199042][ T8032] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f9f0b7aaa10 [ 81.207018][ T8032] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f0b9afd00 [ 81.214993][ T8032] R13: 0000000000ebe1c0 R14: 0000000000000005 R15: 0000000000000000 [ 81.224558][ T8032] Kernel Offset: disabled [ 81.229131][ T8032] Rebooting in 86400 seconds..