Warning: Permanently added '10.128.1.42' (ECDSA) to the list of known hosts. 2019/11/09 11:29:03 fuzzer started 2019/11/09 11:29:05 dialing manager at 10.128.0.105:41185 2019/11/09 11:29:05 syscalls: 2553 2019/11/09 11:29:05 code coverage: enabled 2019/11/09 11:29:05 comparison tracing: enabled 2019/11/09 11:29:05 extra coverage: extra coverage is not supported by the kernel 2019/11/09 11:29:05 setuid sandbox: enabled 2019/11/09 11:29:05 namespace sandbox: enabled 2019/11/09 11:29:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/09 11:29:05 fault injection: enabled 2019/11/09 11:29:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/09 11:29:05 net packet injection: enabled 2019/11/09 11:29:05 net device setup: enabled 2019/11/09 11:29:05 concurrency sanitizer: enabled 2019/11/09 11:29:05 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 85.559076][ T8022] KCSAN: could not find function: 'calc_wb_limits' [ 86.285719][ T8022] KCSAN: could not find function: 'poll_schedule_timeout' [ 93.312875][ T8022] KCSAN: could not find function: 'may_open' 2019/11/09 11:29:30 adding functions to KCSAN blacklist: 'echo_char' 'snd_ctl_notify' '__dentry_kill' 'ima_file_free' 'rcu_gp_fqs_check_wake' 'padata_find_next' 'sctp_association_free' 'balance_dirty_pages' 'dd_has_work' '__d_lookup_done' 'pipe_unlock' 'do_exit' '__dev_queue_xmit' 'bcm_connect' 'blk_mq_dispatch_rq_list' 'p9_poll_workfn' 'timer_clear_idle' 'ext4_nonda_switch' 'xas_clear_mark' 'audit_log_start' 'd_lru_del' 'enqueue_timer' '__hrtimer_run_queues' 'common_perm_cond' 'blk_mq_get_request' 'inactive_list_is_low' 'generic_file_read_iter' 'inet_putpeer' 'wbc_attach_and_unlock_inode' 'shmem_getpage_gfp' 'lookup_user_key' 'pipe_poll' 'add_timer' 'tick_nohz_idle_stop_tick' 'inet_send_prepare' 'file_remove_privs' 'tomoyo_supervisor' 'ep_poll' 'fanout_demux_rollover' 'osq_lock' 'rcu_gp_fqs_loop' 'wq_watchdog_reset_touched' 'ip_finish_output2' '__tcp_transmit_skb' 'xas_find_marked' '__snd_rawmidi_transmit_ack' 'list_lru_count_one' 'ipip_tunnel_xmit' 'ktime_get_real_seconds' 'ext4_mb_good_group' 'wbc_detach_inode' 'fsnotify' 'hrtimer_wakeup' 'wbt_wait' 'tick_sched_do_timer' '__ip6_datagram_connect' 'evict' 'blk_stat_add' 'blk_mq_free_request' 'do_nanosleep' 'lruvec_lru_size' 'sit_tunnel_xmit' 'atime_needs_update' 'do_syslog' 'mm_update_next_owner' 'ext4_mark_iloc_dirty' 'do_sys_open' '__mark_inode_dirty' 'commit_echoes' 'tick_do_update_jiffies64' 'wbt_done' 'kcm_rfree' 'kvm_arch_vcpu_load' 'kernfs_fop_open' '__change_pid' 'filemap_map_pages' '__ext4_new_inode' 'ktime_get_seconds' 'task_dump_owner' 'calc_wb_limits' 'handle_userfault' 'do_dentry_open' 'poll_schedule_timeout' 'mem_cgroup_select_victim_node' 'ext4_da_write_end' 'snd_seq_check_queue' '__find_get_block' 'run_timer_softirq' 'find_get_pages_range_tag' 'ext4_has_free_clusters' 'kauditd_thread' 'lookup_fast' 'get_signal' 'tomoyo_check_acl' 'pid_update_inode' 'n_tty_receive_buf_common' 'ext4_free_inodes_count' 'inet_unhash' 'icmp_global_allow' '__perf_event_overflow' 'find_next_bit' 'sctp_assoc_migrate' 'generic_permission' 'tcp_add_backlog' 'pcpu_alloc' 'copy_process' '__alloc_file' 'vm_area_dup' 'shmem_file_read_iter' 'wbt_issue' 'virtqueue_disable_cb' '__ext4_abort' 'exit_signals' 'mod_timer' 'futex_wait_queue_me' 'add_timer_on' 'snd_seq_prioq_cell_out' 'shrink_node' 'xprt_clear_locked' 'yama_ptracer_del' 'generic_write_end' 'ext4_free_inode' '__inode_add_bytes' 'writeback_sb_inodes' 'inode_sync_complete' 'may_open' 'taskstats_exit' 'blk_mq_sched_dispatch_requests' 'queue_access_lock' '__add_to_page_cache_locked' 'ext4_mb_find_by_goal' 'kernfs_refresh_inode' 'pipe_wait' 'blk_mq_run_hw_queue' 'generic_fillattr' '__remove_hrtimer' 'snapshot_refaults' '__generic_block_fiemap' 'process_srcu' 'page_counter_try_charge' 'vti_tunnel_xmit' 11:33:48 executing program 0: 11:33:48 executing program 1: [ 353.281997][ T8026] IPVS: ftp: loaded support on port[0] = 21 [ 353.425536][ T8026] chnl_net:caif_netlink_parms(): no params data found [ 353.491891][ T8026] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.499327][ T8026] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.507875][ T8026] device bridge_slave_0 entered promiscuous mode [ 353.515447][ T8026] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.522595][ T8026] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.531118][ T8026] device bridge_slave_1 entered promiscuous mode 11:33:48 executing program 2: [ 353.548239][ T8029] IPVS: ftp: loaded support on port[0] = 21 [ 353.561319][ T8026] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 353.580978][ T8026] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 353.611230][ T8026] team0: Port device team_slave_0 added [ 353.619960][ T8026] team0: Port device team_slave_1 added [ 353.697167][ T8026] device hsr_slave_0 entered promiscuous mode [ 353.735036][ T8026] device hsr_slave_1 entered promiscuous mode [ 353.800450][ T8032] IPVS: ftp: loaded support on port[0] = 21 [ 353.884320][ T8029] chnl_net:caif_netlink_parms(): no params data found [ 353.908127][ T8026] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.915286][ T8026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.922577][ T8026] bridge0: port 1(bridge_slave_0) entered blocking state 11:33:49 executing program 3: [ 353.929759][ T8026] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.099798][ T8029] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.145271][ T8029] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.175517][ T8029] device bridge_slave_0 entered promiscuous mode [ 354.220546][ T8026] 8021q: adding VLAN 0 to HW filter on device bond0 [ 354.255255][ T8029] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.262389][ T8029] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.294814][ T8029] device bridge_slave_1 entered promiscuous mode [ 354.316070][ T8026] 8021q: adding VLAN 0 to HW filter on device team0 [ 354.323306][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.356921][ T8056] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.406173][ T8056] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.435317][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 354.512739][ T8062] IPVS: ftp: loaded support on port[0] = 21 [ 354.520479][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.535299][ T8056] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.542458][ T8056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.595469][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.626432][ T8056] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.633496][ T8056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.696072][ T8032] chnl_net:caif_netlink_parms(): no params data found [ 354.716612][ T8029] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 354.735070][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 354.764026][ T8026] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 354.804744][ T8026] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 354.849174][ T8029] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 354.886137][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 11:33:50 executing program 4: [ 354.897636][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 354.926100][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 354.957711][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 354.985890][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 355.017459][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.046079][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 355.085676][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.190253][ T8026] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 355.225481][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 355.233977][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 355.286595][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 355.294074][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 355.355062][ T8029] team0: Port device team_slave_0 added [ 355.394743][ T8032] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.401843][ T8032] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.447445][ T8032] device bridge_slave_0 entered promiscuous mode [ 355.456475][ T8032] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.463621][ T8032] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.515688][ T8032] device bridge_slave_1 entered promiscuous mode [ 355.550726][ T8029] team0: Port device team_slave_1 added [ 355.594094][ T8065] IPVS: ftp: loaded support on port[0] = 21 [ 355.633974][ T8032] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 355.729498][ T8029] device hsr_slave_0 entered promiscuous mode 11:33:51 executing program 5: [ 355.785185][ T8029] device hsr_slave_1 entered promiscuous mode [ 355.824819][ T8029] debugfs: Directory 'hsr0' with parent '/' already present! [ 355.858826][ T8032] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 356.003355][ T8062] chnl_net:caif_netlink_parms(): no params data found [ 356.036291][ T8032] team0: Port device team_slave_0 added [ 356.053320][ T8081] IPVS: ftp: loaded support on port[0] = 21 [ 356.068611][ T8032] team0: Port device team_slave_1 added 11:33:51 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) creat(0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e, 0x0) [ 356.253776][ T8062] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.265157][ T8062] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.272970][ T8062] device bridge_slave_0 entered promiscuous mode [ 356.356090][ T8062] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.363191][ T8062] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.392744][ T8062] device bridge_slave_1 entered promiscuous mode [ 356.457058][ T8032] device hsr_slave_0 entered promiscuous mode [ 356.475876][ T8032] device hsr_slave_1 entered promiscuous mode [ 356.506618][ T8032] debugfs: Directory 'hsr0' with parent '/' already present! [ 356.529253][ T8029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 356.611425][ T8065] chnl_net:caif_netlink_parms(): no params data found [ 356.688670][ T8029] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.754195][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.787225][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.868510][ T8062] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 356.928768][ T8062] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 357.019400][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.038875][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.101042][ T8037] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.108156][ T8037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.185709][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.248541][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.299314][ T8037] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.306427][ T8037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.378668][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 357.445911][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 357.499425][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 357.547305][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 357.589798][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 357.642732][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 357.749556][ T8029] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 357.804715][ T8029] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 357.870840][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.898890][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 357.944164][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 357.999972][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.059851][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 358.119257][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.225730][ T8062] team0: Port device team_slave_0 added [ 358.239903][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 358.308804][ T8062] team0: Port device team_slave_1 added [ 358.314600][ T8065] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.336928][ T8065] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.386351][ T8065] device bridge_slave_0 entered promiscuous mode [ 358.458718][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 358.470954][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 358.518661][ T8029] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 358.539241][ T8032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.602552][ T8065] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.616913][ T8065] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.672235][ T8065] device bridge_slave_1 entered promiscuous mode [ 358.734293][ T8032] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.779047][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.801580][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.850971][ T8081] chnl_net:caif_netlink_parms(): no params data found [ 358.900526][ T8062] device hsr_slave_0 entered promiscuous mode [ 358.965802][ T8062] device hsr_slave_1 entered promiscuous mode [ 359.017864][ T8062] debugfs: Directory 'hsr0' with parent '/' already present! [ 359.057382][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 359.075884][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 359.112507][ T3504] bridge0: port 1(bridge_slave_0) entered blocking state 11:33:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000002d00), 0x4000000000001b6, 0x40010020, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r4, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 359.119610][ T3504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.210231][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 359.243410][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.268036][ T3504] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.275125][ T3504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.296584][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 359.390804][ T8151] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 11:33:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_setup(0x3f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket(0x10, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000440)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r4}], {0x10, 0x6}}, 0x2c, 0x0) fchown(r2, 0xee00, r4) io_submit(0x0, 0x0, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000000)=""/109, 0x6d, 0x10000, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f00000000c0)=""/73) [ 359.664003][ T8065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 359.711114][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.739916][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 359.766172][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 359.783741][ C0] hrtimer: interrupt took 35003 ns [ 359.786165][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 359.814643][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 359.840904][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 359.885742][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 359.909298][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.945576][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 359.981483][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 360.008950][ T8032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 360.046987][ T8151] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 11:33:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_setup(0x3f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket(0x10, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000440)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r4}], {0x10, 0x6}}, 0x2c, 0x0) fchown(r2, 0xee00, r4) io_submit(0x0, 0x0, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000000)=""/109, 0x6d, 0x10000, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f00000000c0)=""/73) [ 360.085701][ T8065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 11:33:55 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x119) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000980)="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", 0x343}], 0x1) write$binfmt_elf32(r1, &(0x7f0000001ec0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d4ee126a46a116415884bc85b4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bce61cd81c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041b71c37046411c8ef1c46dec792ceed6befaf2bc1c103885323acc7a96f845622eb"], 0x865) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 360.141658][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 360.196620][ T8081] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.203756][ T8081] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.255806][ T8081] device bridge_slave_0 entered promiscuous mode [ 360.323477][ T8032] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 360.339080][ T8056] hid-generic 0000:0000:0000.0001: item fetching failed at offset 0/1 [ 360.359162][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 360.368818][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 360.381004][ T8056] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 [ 360.410537][ T8081] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.425843][ T8081] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.479373][ T8081] device bridge_slave_1 entered promiscuous mode 11:33:55 executing program 0: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-control\x00', 0xb862850348cd7c69, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000d40)={{{@in6=@empty, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000400)=0xe8) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 360.548446][ T8065] team0: Port device team_slave_0 added [ 360.582102][ T8065] team0: Port device team_slave_1 added [ 360.632467][ T8062] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.686956][ T8081] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 360.821182][ T8065] device hsr_slave_0 entered promiscuous mode [ 360.823321][ T8207] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 360.885493][ T8065] device hsr_slave_1 entered promiscuous mode 11:33:56 executing program 2: mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='gfs2meta\x00', 0x0, 0x0) [ 360.938544][ T8065] debugfs: Directory 'hsr0' with parent '/' already present! [ 360.954116][ T8081] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 361.009076][ T8062] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.118775][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.134447][ T8213] gfs2: gfs2 mount does not exist [ 361.140453][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:33:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() nanosleep(&(0x7f0000000000)={0x77359400}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x27) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x149}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 361.219616][ T8081] team0: Port device team_slave_0 added [ 361.256082][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.264930][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 11:33:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x13) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_any='access=any'}]}}) readv(r2, &(0x7f0000001700)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) [ 361.353915][ T8030] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.361039][ T8030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.525442][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.582788][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.623378][ T8030] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.630479][ T8030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.725825][ T8081] team0: Port device team_slave_1 added [ 361.753446][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 361.788328][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.850772][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.909251][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.950798][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.009335][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.050485][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.103723][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.221220][ T8081] device hsr_slave_0 entered promiscuous mode [ 362.265097][ T8081] device hsr_slave_1 entered promiscuous mode [ 362.284809][ T8081] debugfs: Directory 'hsr0' with parent '/' already present! [ 362.306001][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.325236][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.354261][ T8062] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 362.415393][ T8062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.455413][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.463794][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.638654][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 362.654973][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 362.665324][ T8062] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.709004][ T8065] 8021q: adding VLAN 0 to HW filter on device bond0 [ 362.779609][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.805509][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.815786][ T8065] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.869462][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.915353][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.924046][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.931135][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.128006][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 363.145495][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 363.195223][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.237703][ T8242] ================================================================== [ 363.245845][ T8242] BUG: KCSAN: data-race in get_task_cred / get_task_cred [ 363.252864][ T8242] [ 363.255210][ T8242] write to 0xffff88812ae55458 of 4 bytes by task 8233 on cpu 0: [ 363.262854][ T8242] get_task_cred+0xd2/0x120 [ 363.265001][ T8030] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.267381][ T8242] proc_pid_status+0x17c/0x1000 [ 363.267408][ T8242] proc_single_show+0x89/0xe0 [ 363.274439][ T8030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.279354][ T8242] seq_read+0x350/0x960 [ 363.279374][ T8242] __vfs_read+0x67/0xc0 [ 363.279401][ T8242] vfs_read+0x143/0x2c0 [ 363.303701][ T8242] ksys_read+0xd5/0x1b0 [ 363.307870][ T8242] __x64_sys_read+0x4c/0x60 [ 363.312389][ T8242] do_syscall_64+0xcc/0x370 [ 363.316902][ T8242] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 363.322787][ T8242] [ 363.325125][ T8242] write to 0xffff88812ae55458 of 4 bytes by task 8242 on cpu 1: [ 363.333198][ T8242] get_task_cred+0xd2/0x120 [ 363.337718][ T8242] proc_pid_status+0x17c/0x1000 [ 363.342574][ T8242] proc_single_show+0x89/0xe0 [ 363.347251][ T8242] seq_read+0x350/0x960 [ 363.351415][ T8242] __vfs_read+0x67/0xc0 [ 363.355761][ T8242] vfs_read+0x143/0x2c0 [ 363.359923][ T8242] ksys_read+0xd5/0x1b0 [ 363.364080][ T8242] __x64_sys_read+0x4c/0x60 [ 363.368604][ T8242] do_syscall_64+0xcc/0x370 [ 363.373120][ T8242] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 363.379007][ T8242] [ 363.381333][ T8242] Reported by Kernel Concurrency Sanitizer on: [ 363.385346][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 363.387505][ T8242] CPU: 1 PID: 8242 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 363.402139][ T8242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.412195][ T8242] ================================================================== [ 363.420268][ T8242] Kernel panic - not syncing: panic_on_warn set ... [ 363.426868][ T8242] CPU: 1 PID: 8242 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 363.433630][ T8242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.443687][ T8242] Call Trace: [ 363.445949][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 363.447002][ T8242] dump_stack+0xf5/0x159 [ 363.459114][ T8242] panic+0x210/0x640 [ 363.463034][ T8242] ? vprintk_func+0x8d/0x140 [ 363.467647][ T8242] kcsan_report.cold+0xc/0xe [ 363.472253][ T8242] kcsan_setup_watchpoint+0x3fe/0x410 [ 363.477662][ T8242] __tsan_unaligned_write4+0x143/0x1f0 [ 363.483148][ T8242] get_task_cred+0xd2/0x120 [ 363.487668][ T8242] proc_pid_status+0x17c/0x1000 [ 363.492701][ T8242] ? __read_once_size.constprop.0+0x12/0x20 [ 363.498623][ T8242] proc_single_show+0x89/0xe0 [ 363.503310][ T8242] seq_read+0x350/0x960 [ 363.507487][ T8242] ? security_file_permission+0x88/0x280 [ 363.513156][ T8242] __vfs_read+0x67/0xc0 [ 363.515950][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 363.517333][ T8242] ? seq_hlist_start_head_rcu+0x60/0x60 [ 363.530943][ T8242] vfs_read+0x143/0x2c0 [ 363.535111][ T8242] ksys_read+0xd5/0x1b0 [ 363.539375][ T8242] __x64_sys_read+0x4c/0x60 [ 363.543891][ T8242] do_syscall_64+0xcc/0x370 [ 363.548506][ T8242] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 363.554405][ T8242] RIP: 0033:0x7eff490cb310 [ 363.558844][ T8242] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 363.575645][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 363.578457][ T8242] RSP: 002b:00007ffc06e84da8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 363.594643][ T8242] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007eff490cb310 [ 363.602621][ T8242] RDX: 0000000000000fff RSI: 00007eff49598d00 RDI: 0000000000000006 [ 363.610628][ T8242] RBP: 0000000000000fff R08: 0000000000000000 R09: 00007eff4939357b [ 363.618612][ T8242] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff49598d00 [ 363.625734][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 363.626620][ T8242] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 363.644207][ T8242] Kernel Offset: disabled [ 363.648544][ T8242] Rebooting in 86400 seconds..