Warning: Permanently added '10.128.0.251' (ECDSA) to the list of known hosts. 2019/11/11 22:15:05 fuzzer started 2019/11/11 22:15:07 dialing manager at 10.128.0.105:44241 2019/11/11 22:15:17 syscalls: 2566 2019/11/11 22:15:17 code coverage: enabled 2019/11/11 22:15:17 comparison tracing: enabled 2019/11/11 22:15:17 extra coverage: extra coverage is not supported by the kernel 2019/11/11 22:15:17 setuid sandbox: enabled 2019/11/11 22:15:17 namespace sandbox: enabled 2019/11/11 22:15:17 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/11 22:15:17 fault injection: enabled 2019/11/11 22:15:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/11 22:15:17 net packet injection: enabled 2019/11/11 22:15:17 net device setup: enabled 2019/11/11 22:15:17 concurrency sanitizer: enabled 2019/11/11 22:15:17 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 72.062524][ T7932] KCSAN: could not find function: 'calc_wb_limits' [ 76.293365][ T7932] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/11 22:15:29 adding functions to KCSAN blacklist: 'commit_echoes' 'p9_client_cb' '__ext4_new_inode' 'audit_log_start' 'ext4_nonda_switch' 'ext4_mark_iloc_dirty' 'tick_do_update_jiffies64' 'vm_area_dup' 'echo_char' 'complete_signal' 'snapshot_refaults' 'calc_wb_limits' 'ep_poll' 'fsnotify' 'tick_nohz_idle_stop_tick' 'xas_clear_mark' 'mm_update_next_owner' 'add_timer' 'do_syslog' 'kvm_mmu_notifier_invalidate_range_end' '__hrtimer_run_queues' 'common_perm_cond' 'task_dump_owner' 'generic_permission' 'find_next_bit' 'ext4_free_inode' 'ext4_has_free_clusters' 'ext4_free_inodes_count' 'filemap_map_pages' 'ktime_get_seconds' '__perf_event_overflow' 'tcp_add_backlog' 'run_timer_softirq' 'snd_ctl_notify' 'mem_cgroup_select_victim_node' 'generic_fillattr' 'atime_needs_update' 'do_nanosleep' 'poll_schedule_timeout' 'lruvec_lru_size' 'taskstats_exit' 'rcu_gp_fqs_check_wake' 'kauditd_thread' 'blk_mq_run_hw_queue' 'timer_clear_idle' 'sbitmap_queue_clear' 'exit_signals' 'tick_sched_do_timer' 'do_exit' 'queue_access_lock' 'yama_ptracer_del' 'blk_mq_get_request' 'd_instantiate_new' 'pipe_poll' 'mod_timer' 'copy_process' 'xas_find_marked' 'osq_lock' 'file_update_time' 'ktime_get_real_seconds' '__add_to_page_cache_locked' '__ip6_datagram_connect' 'p9_poll_workfn' 'bio_endio' 'pid_update_inode' 'find_get_pages_range_tag' 'process_srcu' 'generic_write_end' 'page_counter_try_charge' 'n_tty_receive_buf_common' 'blk_mq_dispatch_rq_list' 'blk_mq_sched_dispatch_requests' 'tomoyo_supervisor' 'wbt_done' '__delete_from_page_cache' 'dd_has_work' 22:19:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000400)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) open(0x0, 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) dup2(0xffffffffffffffff, r0) keyctl$assume_authority(0x10, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="73cb4f5f00ad4c6d59ff1291dac816f5e194fb4882093322c97e609599a36c9a79c14c3e9b7b941d4a40d77e0cb140a728786409feceb2df0dfc5bca8dba7cd5f81196b8a7b127aa8fdc44198036afc79d1635b7a719813d8eef8912f021fb80aa05d39e2112b73d3761cc93464f57f4b0985ea05ecdaaeffe6a204999135bc5525310edbcaee5c160171da6b634cce69ba45bfacd9d27e525", 0x99, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) creat(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d0400b4f4d4f60000030000002272a062b49232e134e85da7bf155ef74de2d504f04c8379255ef57c4189149253303d25713090b4bab248e2be30a506272cd585c567858a82053222021a24f57e3ccf664c90f6cc39be4332f4c75416833562378c1dc49a31eb0a69f8e6a00d0c7993fe73877b7eb8d75860717b6951fdf77e56261c1916c90b29f7") setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000001c0)={0x5, 0x6, 0xb000}, 0x4) 22:19:22 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000440), 0xc) [ 314.664157][ T7937] IPVS: ftp: loaded support on port[0] = 21 [ 314.791268][ T7937] chnl_net:caif_netlink_parms(): no params data found [ 314.850704][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.858063][ T7937] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.866789][ T7937] device bridge_slave_0 entered promiscuous mode [ 314.874944][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.882054][ T7937] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.890750][ T7937] device bridge_slave_1 entered promiscuous mode 22:19:22 executing program 2: accept$netrom(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) [ 314.909772][ T7937] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.913025][ T7940] IPVS: ftp: loaded support on port[0] = 21 [ 314.920503][ T7937] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.954305][ T7937] team0: Port device team_slave_0 added [ 314.960998][ T7937] team0: Port device team_slave_1 added [ 315.065768][ T7937] device hsr_slave_0 entered promiscuous mode [ 315.113306][ T7937] device hsr_slave_1 entered promiscuous mode 22:19:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8e18) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) fallocate(r1, 0x3, 0x9ffc, 0x8003) fallocate(r1, 0x3, 0x5e89, 0xfff9) syz_genetlink_get_family_id$team(0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) [ 315.195927][ T7943] IPVS: ftp: loaded support on port[0] = 21 [ 315.335646][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.342832][ T7937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.350167][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.357245][ T7937] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.469634][ T7940] chnl_net:caif_netlink_parms(): no params data found [ 315.640039][ T7937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.684374][ T7940] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.691463][ T7940] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.733363][ T7940] device bridge_slave_0 entered promiscuous mode [ 315.789608][ T7940] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.802511][ T7940] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.810565][ T7940] device bridge_slave_1 entered promiscuous mode [ 315.850147][ T7937] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.889657][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 315.904520][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.943716][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.965522][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 316.030587][ T7940] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.035036][ T7972] IPVS: ftp: loaded support on port[0] = 21 22:19:24 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20000000070101ee73b36ebc000000ebfff4aba7f56d400008000100df25f402"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) [ 316.072599][ T7943] chnl_net:caif_netlink_parms(): no params data found [ 316.139801][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 316.153159][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.161564][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.168655][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.263052][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 316.271878][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.333221][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.340359][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.383646][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 316.413083][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 316.458565][ T7940] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.526611][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 316.573700][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 316.609119][ T7937] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 316.652416][ T7937] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 316.696421][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 316.723315][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 316.754962][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 316.783603][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 316.814994][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.843409][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 316.875208][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.914786][ T7940] team0: Port device team_slave_0 added [ 316.922860][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 316.963625][ T7940] team0: Port device team_slave_1 added [ 316.969377][ T7946] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 316.984817][ T7946] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 317.004873][ T7977] IPVS: ftp: loaded support on port[0] = 21 22:19:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @enum]}, {0x0, [0x61]}}, 0x0, 0x37}, 0x20) [ 317.036240][ T7943] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.043431][ T7943] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.063063][ T7943] device bridge_slave_0 entered promiscuous mode [ 317.076612][ T7943] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.091276][ T7943] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.099635][ T7943] device bridge_slave_1 entered promiscuous mode [ 317.112177][ T7937] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.167173][ T7943] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 317.177777][ T7943] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 317.234740][ T7940] device hsr_slave_0 entered promiscuous mode [ 317.272998][ T7940] device hsr_slave_1 entered promiscuous mode [ 317.312534][ T7940] debugfs: Directory 'hsr0' with parent '/' already present! [ 317.343828][ T7943] team0: Port device team_slave_0 added [ 317.403276][ T7990] IPVS: ftp: loaded support on port[0] = 21 [ 317.422697][ T7943] team0: Port device team_slave_1 added [ 317.516190][ T7943] device hsr_slave_0 entered promiscuous mode 22:19:25 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x21) open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 317.593110][ T7943] device hsr_slave_1 entered promiscuous mode [ 317.602174][ C0] hrtimer: interrupt took 34828 ns [ 317.673130][ T7943] debugfs: Directory 'hsr0' with parent '/' already present! [ 317.737165][ T7972] chnl_net:caif_netlink_parms(): no params data found 22:19:25 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x21) open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 318.023066][ T7940] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.113004][ T7977] chnl_net:caif_netlink_parms(): no params data found [ 318.163160][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.170951][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 22:19:26 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x21) open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 318.233210][ T7940] 8021q: adding VLAN 0 to HW filter on device team0 [ 318.347689][ T7972] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.362836][ T7972] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.407913][ T7972] device bridge_slave_0 entered promiscuous mode [ 318.482493][ T7943] 8021q: adding VLAN 0 to HW filter on device bond0 22:19:26 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x21) open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 318.566964][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.590789][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.685720][ T7961] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.692991][ T7961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.796584][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.833146][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 22:19:26 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) [ 318.903278][ T7961] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.910431][ T7961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.992173][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 319.047052][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 319.082251][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 319.126308][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 319.206604][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 319.261386][ T26] audit: type=1804 audit(1573510767.158:31): pid=8079 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir183198442/syzkaller.rNCO3m/5/bus" dev="sda1" ino=16527 res=1 [ 319.288971][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 319.327837][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 319.384175][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 319.434151][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 22:19:27 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) [ 319.475134][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 319.566807][ T7972] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.582947][ T7972] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.642573][ T7972] device bridge_slave_1 entered promiscuous mode [ 319.680476][ T7943] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.727164][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 319.761422][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 319.779763][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 319.837280][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.867634][ T26] audit: type=1804 audit(1573510767.768:32): pid=8084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir183198442/syzkaller.rNCO3m/6/bus" dev="sda1" ino=16527 res=1 [ 319.896126][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.972669][ T7990] chnl_net:caif_netlink_parms(): no params data found [ 320.049300][ T7977] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.069148][ T7977] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.133180][ T7977] device bridge_slave_0 entered promiscuous mode [ 320.179483][ T7940] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 320.212985][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.223272][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.290017][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.297101][ T7941] bridge0: port 1(bridge_slave_0) entered forwarding state 22:19:28 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) [ 320.372969][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.454975][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.517161][ T7941] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.524270][ T7941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.525387][ T26] audit: type=1804 audit(1573510768.428:33): pid=8089 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir183198442/syzkaller.rNCO3m/7/bus" dev="sda1" ino=16527 res=1 [ 320.594890][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.642973][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.690309][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 320.730955][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 320.774142][ T7972] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 320.846365][ T7977] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.854228][ T7977] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.886059][ T7977] device bridge_slave_1 entered promiscuous mode [ 320.919988][ T7943] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 320.972416][ T7943] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.998574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.026226][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.035633][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.044987][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.054350][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 321.063635][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.072122][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.095159][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.113596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.133252][ T7972] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 321.161692][ T7990] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.168917][ T7990] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.178142][ T7990] device bridge_slave_0 entered promiscuous mode [ 321.200369][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 321.208691][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 321.221797][ T7943] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.230482][ T7990] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.237968][ T7990] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.249679][ T7990] device bridge_slave_1 entered promiscuous mode [ 321.266473][ T7977] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 321.278479][ T7977] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 321.297204][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 321.308300][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 321.317396][ T7972] team0: Port device team_slave_0 added [ 321.336659][ T8113] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 321.342430][ T7977] team0: Port device team_slave_0 added [ 321.367709][ T7977] team0: Port device team_slave_1 added [ 321.380148][ T7972] team0: Port device team_slave_1 added 22:19:29 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) [ 321.408763][ T7990] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 321.459871][ T26] audit: type=1804 audit(1573510769.358:34): pid=8118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir183198442/syzkaller.rNCO3m/8/bus" dev="sda1" ino=16530 res=1 [ 321.496504][ T7977] device hsr_slave_0 entered promiscuous mode [ 321.546500][ T7977] device hsr_slave_1 entered promiscuous mode [ 321.592483][ T7977] debugfs: Directory 'hsr0' with parent '/' already present! [ 321.601297][ T7990] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 321.664442][ T7972] device hsr_slave_0 entered promiscuous mode [ 321.702822][ T7972] device hsr_slave_1 entered promiscuous mode [ 321.752605][ T7972] debugfs: Directory 'hsr0' with parent '/' already present! [ 321.781513][ T7990] team0: Port device team_slave_0 added [ 321.794230][ T7990] team0: Port device team_slave_1 added [ 322.035082][ T7990] device hsr_slave_0 entered promiscuous mode [ 322.072869][ T7990] device hsr_slave_1 entered promiscuous mode [ 322.122461][ T7990] debugfs: Directory 'hsr0' with parent '/' already present! [ 322.380962][ T7977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.473050][ T7972] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.497929][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.549387][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.615087][ T7977] 8021q: adding VLAN 0 to HW filter on device team0 22:19:30 executing program 2: accept$netrom(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) [ 322.661501][ T7972] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.782655][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.790655][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.902512][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.911151][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.997160][ T7961] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.004264][ T7961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.152870][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.232951][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.303258][ T7961] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.310367][ T7961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.427143][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 323.503723][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 323.629675][ T7977] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 323.741271][ T7977] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 323.833024][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.841063][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.932921][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.004112][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.011203][ T7941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.135521][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.206324][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.275749][ T7941] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.282923][ T7941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.406928][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.483576][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.697094][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 324.764602][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 324.835312][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 324.897939][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 324.967217][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 325.044493][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 325.111936][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 325.198929][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 325.268544][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 325.341938][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.416771][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 325.500001][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.571893][ T7972] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 325.662854][ T7972] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 325.786447][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 325.810331][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 325.877193][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 325.976733][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 326.057428][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.128234][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.210450][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.283055][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.363607][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 326.440891][ T7977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.500552][ T7990] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.563309][ T7974] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 326.570998][ T7974] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 326.700398][ T7972] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.783098][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 326.800759][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 326.857860][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 326.948028][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 327.034838][ T7990] 8021q: adding VLAN 0 to HW filter on device team0 [ 327.124117][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 327.136238][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.226588][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.233757][ T7941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.293874][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.324174][ T8221] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 327.328557][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.373484][ T7941] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.380643][ T7941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.433343][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 327.480677][ T7990] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 327.515782][ T7990] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 327.551200][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.563758][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 327.576245][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 327.586038][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 327.599353][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 327.609249][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 327.620076][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.628519][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.637376][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.645768][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.664385][ T7990] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 327.671919][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.680817][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.689221][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 327.697227][ T7961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 22:19:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8e18) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) fallocate(r1, 0x3, 0x9ffc, 0x8003) fallocate(r1, 0x3, 0x5e89, 0xfff9) syz_genetlink_get_family_id$team(0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) 22:19:36 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000440), 0xc) 22:19:36 executing program 2: accept$netrom(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) 22:19:36 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000440), 0xc) 22:19:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x7, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 22:19:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) sched_getscheduler(0x0) [ 328.472915][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 328.478823][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:19:36 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000440), 0xc) 22:19:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = epoll_create1(0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000500)={0x0, 0x0, 0x8f}, 0x0, &(0x7f0000001a40), &(0x7f0000001c40)=""/143) 22:19:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8e18) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) fallocate(r1, 0x3, 0x9ffc, 0x8003) fallocate(r1, 0x3, 0x5e89, 0xfff9) syz_genetlink_get_family_id$team(0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) 22:19:36 executing program 2: accept$netrom(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) 22:19:36 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000440), 0xc) 22:19:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) sched_getscheduler(0x0) 22:19:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = epoll_create1(0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000500)={0x0, 0x0, 0x8f}, 0x0, &(0x7f0000001a40), &(0x7f0000001c40)=""/143) 22:19:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = epoll_create1(0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000500)={0x0, 0x0, 0x8f}, 0x0, &(0x7f0000001a40), &(0x7f0000001c40)=""/143) 22:19:37 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000440), 0xc) 22:19:37 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000440), 0xc) 22:19:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) sched_getscheduler(0x0) 22:19:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = epoll_create1(0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000500)={0x0, 0x0, 0x8f}, 0x0, &(0x7f0000001a40), &(0x7f0000001c40)=""/143) [ 329.530740][ T8304] ================================================================== [ 329.538970][ T8304] BUG: KCSAN: data-race in __mark_inode_dirty / __writeback_single_inode [ 329.547368][ T8304] [ 329.549699][ T8304] write to 0xffff8880b89aab40 of 8 bytes by task 8035 on cpu 1: [ 329.557420][ T8304] __writeback_single_inode+0x328/0x8e0 [ 329.564267][ T8304] writeback_sb_inodes+0x4ba/0xa50 [ 329.569394][ T8304] wb_writeback+0x1f9/0x6a0 [ 329.573905][ T8304] wb_workfn+0x22e/0x970 [ 329.578149][ T8304] process_one_work+0x3d4/0x890 [ 329.582994][ T8304] worker_thread+0xa0/0x800 [ 329.587496][ T8304] kthread+0x1d4/0x200 [ 329.591574][ T8304] ret_from_fork+0x1f/0x30 [ 329.595971][ T8304] [ 329.598297][ T8304] read to 0xffff8880b89aab40 of 8 bytes by task 8304 on cpu 0: [ 329.605833][ T8304] __mark_inode_dirty+0xb8/0x940 [ 329.610771][ T8304] mark_buffer_dirty+0x29c/0x2c0 [ 329.615708][ T8304] __block_commit_write.isra.0+0x11f/0x170 [ 329.621508][ T8304] block_write_end+0x6d/0x140 [ 329.626181][ T8304] generic_write_end+0x8a/0x1f0 [ 329.631025][ T8304] ext4_da_write_end+0x158/0x620 [ 329.636061][ T8304] generic_perform_write+0x1d3/0x320 [ 329.641341][ T8304] __generic_file_write_iter+0x251/0x380 [ 329.646974][ T8304] ext4_file_write_iter+0x1bd/0xa00 [ 329.652183][ T8304] new_sync_write+0x388/0x4a0 [ 329.656875][ T8304] __vfs_write+0xb1/0xc0 [ 329.661112][ T8304] vfs_write+0x18a/0x390 [ 329.665351][ T8304] ksys_write+0xd5/0x1b0 [ 329.669588][ T8304] __x64_sys_write+0x4c/0x60 [ 329.674178][ T8304] do_syscall_64+0xcc/0x370 [ 329.678691][ T8304] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.684566][ T8304] [ 329.686884][ T8304] Reported by Kernel Concurrency Sanitizer on: [ 329.693064][ T8304] CPU: 0 PID: 8304 Comm: syz-executor.3 Not tainted 5.4.0-rc6+ #0 [ 329.700855][ T8304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.710908][ T8304] ================================================================== [ 329.718967][ T8304] Kernel panic - not syncing: panic_on_warn set ... [ 329.725554][ T8304] CPU: 0 PID: 8304 Comm: syz-executor.3 Not tainted 5.4.0-rc6+ #0 [ 329.733712][ T8304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.743767][ T8304] Call Trace: [ 329.747080][ T8304] dump_stack+0xf5/0x159 [ 329.751329][ T8304] panic+0x210/0x640 [ 329.752435][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 329.755238][ T8304] ? vprintk_func+0x8d/0x140 [ 329.755269][ T8304] kcsan_report.cold+0xc/0xe [ 329.760986][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 329.765553][ T8304] kcsan_setup_watchpoint+0x3fe/0x410 [ 329.765578][ T8304] __tsan_read8+0x145/0x1f0 [ 329.765611][ T8304] __mark_inode_dirty+0xb8/0x940 [ 329.790671][ T8304] ? __unlock_page_memcg+0x47/0xa0 [ 329.795803][ T8304] mark_buffer_dirty+0x29c/0x2c0 [ 329.800769][ T8304] __block_commit_write.isra.0+0x11f/0x170 [ 329.806598][ T8304] block_write_end+0x6d/0x140 [ 329.811295][ T8304] generic_write_end+0x8a/0x1f0 [ 329.816159][ T8304] ext4_da_write_end+0x158/0x620 [ 329.821115][ T8304] ? ext4_write_end+0x800/0x800 [ 329.825977][ T8304] generic_perform_write+0x1d3/0x320 [ 329.831281][ T8304] __generic_file_write_iter+0x251/0x380 [ 329.836921][ T8304] ? constant_test_bit+0x12/0x30 [ 329.841884][ T8304] ext4_file_write_iter+0x1bd/0xa00 [ 329.847107][ T8304] ? iov_iter_init+0xe2/0x120 [ 329.851837][ T8304] new_sync_write+0x388/0x4a0 [ 329.856549][ T8304] __vfs_write+0xb1/0xc0 [ 329.860805][ T8304] vfs_write+0x18a/0x390 [ 329.865064][ T8304] ksys_write+0xd5/0x1b0 [ 329.869331][ T8304] __x64_sys_write+0x4c/0x60 [ 329.873945][ T8304] do_syscall_64+0xcc/0x370 [ 329.878461][ T8304] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.884360][ T8304] RIP: 0033:0x45a219 [ 329.888295][ T8304] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.907908][ T8304] RSP: 002b:00007f2875da8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 329.916333][ T8304] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 329.924317][ T8304] RDX: 00000000fffffe58 RSI: 0000000020000080 RDI: 0000000000000003 [ 329.932416][ T8304] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 329.940400][ T8304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2875da96d4 [ 329.948424][ T8304] R13: 00000000004cab82 R14: 00000000004e3048 R15: 00000000ffffffff [ 329.957725][ T8304] Kernel Offset: disabled [ 329.962046][ T8304] Rebooting in 86400 seconds..