Warning: Permanently added '10.128.0.176' (ECDSA) to the list of known hosts. 2020/06/28 13:02:30 fuzzer started 2020/06/28 13:02:30 dialing manager at 10.128.0.105:46147 2020/06/28 13:02:30 syscalls: 3105 2020/06/28 13:02:30 code coverage: enabled 2020/06/28 13:02:30 comparison tracing: enabled 2020/06/28 13:02:30 extra coverage: enabled 2020/06/28 13:02:30 setuid sandbox: enabled 2020/06/28 13:02:30 namespace sandbox: enabled 2020/06/28 13:02:30 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/28 13:02:30 fault injection: enabled 2020/06/28 13:02:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/28 13:02:30 net packet injection: enabled 2020/06/28 13:02:30 net device setup: enabled 2020/06/28 13:02:30 concurrency sanitizer: enabled 2020/06/28 13:02:30 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/28 13:02:30 USB emulation: enabled 2020/06/28 13:02:31 suppressing KCSAN reports in functions: 'do_epoll_wait' 'do_signal_stop' 'alloc_pid' '__send_signal' 'fasync_remove_entry' 'shmem_add_to_page_cache' 'complete_signal' '__ext4_new_inode' 'do_nanosleep' 'generic_write_end' 'ext4_free_inode' 'expire_timers' '__xa_clear_mark' 'do_syslog' 13:02:38 executing program 0: unshare(0x40020400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) syzkaller login: [ 39.646093][ T8674] IPVS: ftp: loaded support on port[0] = 21 [ 39.704718][ T8674] chnl_net:caif_netlink_parms(): no params data found [ 39.738682][ T8674] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.745950][ T8674] bridge0: port 1(bridge_slave_0) entered disabled state 13:02:38 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0445624, &(0x7f0000000080)={0x0, 0x0, 0x0, [], 0x0}) [ 39.753887][ T8674] device bridge_slave_0 entered promiscuous mode [ 39.761786][ T8674] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.768926][ T8674] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.776396][ T8674] device bridge_slave_1 entered promiscuous mode [ 39.790810][ T8674] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.804016][ T8674] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.821897][ T8674] team0: Port device team_slave_0 added [ 39.828902][ T8674] team0: Port device team_slave_1 added [ 39.841887][ T8674] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.849296][ T8674] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.875953][ T8674] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.888454][ T8674] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.895449][ T8674] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.921658][ T8674] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 13:02:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x4800, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x6c, 0x0, 0x3f00}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0xf0}, 0x0) pipe(&(0x7f0000000000)) accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={r4, 0xdc, &(0x7f0000000340)=[@in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0xffff, @private1={0xfc, 0x1, [], 0x1}, 0x20}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x1, @private0={0xfc, 0x0, [], 0x1}, 0xc}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x3c}, 0x80000000}, @in6={0xa, 0x4e24, 0xfffffbff, @mcast2}, @in6={0xa, 0x4e24, 0xd8db, @empty, 0x6}]}, &(0x7f0000000140)=0x10) getsockname$packet(r2, 0x0, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r5) ioctl$VIDIOC_S_CROP(r5, 0x4014563c, &(0x7f00000000c0)={0xc, {0x8, 0xc4, 0x3f, 0xa}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x0) [ 40.018657][ T8674] device hsr_slave_0 entered promiscuous mode [ 40.097139][ T8674] device hsr_slave_1 entered promiscuous mode [ 40.162193][ T8828] IPVS: ftp: loaded support on port[0] = 21 [ 40.173837][ T8840] IPVS: ftp: loaded support on port[0] = 21 13:02:39 executing program 3: clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r1, &(0x7f0000000740)=""/384, 0x200008c0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x0, 0x800000000004, @tid=r0}, 0x0) [ 40.309474][ T8840] chnl_net:caif_netlink_parms(): no params data found [ 40.330002][ T8828] chnl_net:caif_netlink_parms(): no params data found [ 40.340824][ T8674] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 40.399218][ T8674] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 40.462976][ T9085] IPVS: ftp: loaded support on port[0] = 21 [ 40.478418][ T8674] netdevsim netdevsim0 netdevsim2: renamed from eth2 13:02:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200000000005b47b4b04fed4e2a21ad8beb06b167de4283ffaec56d159e56a166c9db835a8808a86292f4bea321847a42767a7b89b65e4841c9695825a4b10dd5cb8b24f89f29ceef0a428124dcefb40b6b8ce6222864e92d22b053bda211a0aa613e4d66c8a0490480cbaca2b1216ca5637c028cbe0af4fd21ed36a2ddd56830044f3ead6d80d6f3f39955a2bb6662c29c913e8356d5a58ddb4293241f2ed955ffa0b9"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000015c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x275a}, {}, {0x8}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 40.518658][ T8674] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 40.589573][ T8674] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.597800][ T8674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.605160][ T8674] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.612266][ T8674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.672751][ T8840] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.680357][ T8840] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.688638][ T8840] device bridge_slave_0 entered promiscuous mode 13:02:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0)='ethtool\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'wg2\x00'}) r1 = dup(0xffffffffffffffff) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r2}) r3 = dup(0xffffffffffffffff) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup(0xffffffffffffffff) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000440)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @rand_addr=0x64010100}, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r2}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r7}) r8 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getpeername$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r8, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r11}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, &(0x7f0000007140)={0x0, 0x1c9c380}) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"/903], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e060000630677fbac141441e0", 0x0, 0x0, 0xfc, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000100)="03fd3f4eee248a1fdec85445319cf7ecd1ba97258860936dca69fe4c8652c4b9239717fc8f24e0445054c2de0e1cd9"}, 0x40) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 40.718644][ T9152] IPVS: ftp: loaded support on port[0] = 21 [ 40.727500][ T8828] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.734522][ T8828] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.744418][ T8828] device bridge_slave_0 entered promiscuous mode [ 40.752429][ T8840] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.760991][ T8840] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.769459][ T8840] device bridge_slave_1 entered promiscuous mode [ 40.779700][ T8263] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.799359][ T8263] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.836877][ T8828] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.844091][ T8828] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.852740][ T8828] device bridge_slave_1 entered promiscuous mode [ 40.866077][ T9085] chnl_net:caif_netlink_parms(): no params data found [ 40.885444][ T9208] IPVS: ftp: loaded support on port[0] = 21 [ 40.907318][ T8828] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.923618][ T8840] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.935948][ T8840] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.946134][ T8828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.973865][ T8674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.000057][ T9152] chnl_net:caif_netlink_parms(): no params data found [ 41.015798][ T8828] team0: Port device team_slave_0 added [ 41.023977][ T8828] team0: Port device team_slave_1 added [ 41.034446][ T8674] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.042825][ T8840] team0: Port device team_slave_0 added [ 41.070333][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.078101][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.098516][ T8840] team0: Port device team_slave_1 added [ 41.126803][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 41.135437][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.144541][ T8262] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.152240][ T8262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.160238][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 41.169374][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.178043][ T8262] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.185208][ T8262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.193547][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 41.202657][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 41.211598][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 41.220468][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 41.230252][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 41.238773][ T8262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 41.251099][ T8828] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 41.258294][ T8828] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.286011][ T8828] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 41.299600][ T8828] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 41.307215][ T8828] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.334110][ T8828] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 41.345053][ T9085] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.352469][ T9085] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.359898][ T9085] device bridge_slave_0 entered promiscuous mode [ 41.370301][ T9085] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.377388][ T9085] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.384877][ T9085] device bridge_slave_1 entered promiscuous mode [ 41.392648][ T8260] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 41.401763][ T8260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 41.410231][ T8260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.425033][ T8840] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 41.432688][ T8840] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.460298][ T8840] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 41.472021][ T8840] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 41.479089][ T8840] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.505362][ T8840] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 41.516615][ T9152] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.523638][ T9152] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.531619][ T9152] device bridge_slave_0 entered promiscuous mode [ 41.578083][ T8828] device hsr_slave_0 entered promiscuous mode [ 41.626781][ T8828] device hsr_slave_1 entered promiscuous mode [ 41.666410][ T8828] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 41.666416][ T8828] Cannot create hsr debugfs directory [ 41.708123][ T8840] device hsr_slave_0 entered promiscuous mode [ 41.747831][ T8840] device hsr_slave_1 entered promiscuous mode [ 41.796457][ T8840] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 41.804095][ T8840] Cannot create hsr debugfs directory [ 41.817349][ T9152] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.824389][ T9152] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.832534][ T9152] device bridge_slave_1 entered promiscuous mode [ 41.840699][ T9085] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 41.863051][ T8263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 41.871278][ T8263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.880288][ T8674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 41.899558][ T9085] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 41.920794][ T9085] team0: Port device team_slave_0 added [ 41.927916][ T9085] team0: Port device team_slave_1 added [ 41.940443][ T9152] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 41.971027][ T9152] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 41.981193][ T8263] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 41.988884][ T8263] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 42.000203][ T9085] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.007366][ T9085] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.037788][ T9085] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.050170][ T9085] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.057281][ T9085] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.083366][ T9085] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.102575][ T5034] ================================================================== [ 42.110762][ T5034] BUG: KCSAN: data-race in copy_process / copy_process [ 42.117666][ T5034] [ 42.119771][ T8840] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 42.120082][ T5034] write to 0xffffffff89281410 of 4 bytes by task 21 on cpu 1: [ 42.134177][ T5034] copy_process+0x2e53/0x32b0 [ 42.138962][ T5034] _do_fork+0xf1/0x660 [ 42.143010][ T5034] kernel_thread+0x85/0xb0 [ 42.147795][ T5034] call_usermodehelper_exec_work+0x4f/0x1b0 [ 42.153656][ T5034] process_one_work+0x3cb/0x990 [ 42.158577][ T5034] worker_thread+0x665/0xbe0 [ 42.164193][ T5034] kthread+0x210/0x220 [ 42.168323][ T5034] ret_from_fork+0x1f/0x30 [ 42.174190][ T5034] [ 42.176492][ T5034] read to 0xffffffff89281410 of 4 bytes by task 5034 on cpu 0: [ 42.184002][ T5034] copy_process+0xab5/0x32b0 [ 42.188601][ T5034] _do_fork+0xf1/0x660 [ 42.192725][ T5034] __x64_sys_clone+0xfb/0x120 [ 42.197397][ T5034] do_syscall_64+0x71/0x120 [ 42.201974][ T5034] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 42.207973][ T5034] [ 42.210270][ T5034] Reported by Kernel Concurrency Sanitizer on: [ 42.216394][ T5034] CPU: 0 PID: 5034 Comm: systemd-udevd Not tainted 5.8.0-rc2-syzkaller #0 [ 42.224855][ T5034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.234880][ T5034] ================================================================== [ 42.242932][ T5034] Kernel panic - not syncing: panic_on_warn set ... [ 42.249527][ T5034] CPU: 0 PID: 5034 Comm: systemd-udevd Not tainted 5.8.0-rc2-syzkaller #0 [ 42.257992][ T5034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.268017][ T5034] Call Trace: [ 42.271300][ T5034] dump_stack+0x10f/0x19d [ 42.276563][ T5034] panic+0x1f8/0x63a [ 42.280427][ T5034] ? vprintk_emit+0x44a/0x4f0 [ 42.285088][ T5034] kcsan_report+0x684/0x690 [ 42.289663][ T5034] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 42.295282][ T5034] ? copy_process+0xab5/0x32b0 [ 42.300364][ T5034] ? _do_fork+0xf1/0x660 [ 42.304628][ T5034] ? __x64_sys_clone+0xfb/0x120 [ 42.309451][ T5034] ? do_syscall_64+0x71/0x120 [ 42.314117][ T5034] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 42.320161][ T5034] ? do_machine_check+0xe90/0x15d0 [ 42.325340][ T5034] ? check_preemption_disabled+0x3f/0x1a0 [ 42.331127][ T5034] ? copy_creds+0x280/0x350 [ 42.335597][ T5034] ? copy_creds+0x280/0x350 [ 42.340072][ T5034] kcsan_setup_watchpoint+0x453/0x4d0 [ 42.345451][ T5034] ? copy_creds+0x280/0x350 [ 42.350072][ T5034] copy_process+0xab5/0x32b0 [ 42.354731][ T5034] ? seccomp_run_filters+0x1fe/0x220 [ 42.360087][ T5034] ? __seccomp_filter+0x4b2/0xb80 [ 42.365085][ T5034] ? __this_cpu_preempt_check+0x18/0x1a [ 42.370762][ T5034] ? __local_bh_enable_ip+0x48/0x70 [ 42.375943][ T5034] ? local_bh_enable+0x1b/0x20 [ 42.380693][ T5034] ? check_preemption_disabled+0x3f/0x1a0 [ 42.386660][ T5034] _do_fork+0xf1/0x660 [ 42.390723][ T5034] __x64_sys_clone+0xfb/0x120 [ 42.395409][ T5034] do_syscall_64+0x71/0x120 [ 42.399916][ T5034] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 42.405784][ T5034] RIP: 0033:0x7ff864d5338b [ 42.410168][ T5034] Code: Bad RIP value. [ 42.414202][ T5034] RSP: 002b:00007ffff5acb290 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 42.422629][ T5034] RAX: ffffffffffffffda RBX: 00007ffff5acb290 RCX: 00007ff864d5338b [ 42.430576][ T5034] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 42.438521][ T5034] RBP: 00007ffff5acb2e0 R08: 00007ff865f038c0 R09: 0000000000000210 [ 42.446637][ T5034] R10: 00007ff865f03b90 R11: 0000000000000246 R12: 0000000000000000 [ 42.454650][ T5034] R13: 0000000000000020 R14: 0000000000000000 R15: 0000000000000000 [ 42.464877][ T5034] Kernel Offset: disabled [ 42.469196][ T5034] Rebooting in 86400 seconds..