[info] Using makefile-style concurrent boot in runlevel 2. [ 45.487860][ T26] audit: type=1800 audit(1575076762.186:21): pid=7514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 45.535262][ T26] audit: type=1800 audit(1575076762.186:22): pid=7514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.100' (ECDSA) to the list of known hosts. 2019/11/30 01:19:30 fuzzer started 2019/11/30 01:19:32 dialing manager at 10.128.0.105:44645 2019/11/30 01:19:32 syscalls: 2592 2019/11/30 01:19:32 code coverage: enabled 2019/11/30 01:19:32 comparison tracing: enabled 2019/11/30 01:19:32 extra coverage: extra coverage is not supported by the kernel 2019/11/30 01:19:32 setuid sandbox: enabled 2019/11/30 01:19:32 namespace sandbox: enabled 2019/11/30 01:19:32 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 01:19:32 fault injection: enabled 2019/11/30 01:19:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 01:19:32 net packet injection: enabled 2019/11/30 01:19:32 net device setup: enabled 2019/11/30 01:19:32 concurrency sanitizer: enabled 2019/11/30 01:19:32 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/30 01:19:33 adding functions to KCSAN blacklist: 'find_get_pages_range_tag' 'tomoyo_supervisor' 'tcp_add_backlog' 'find_next_bit' 'blk_mq_get_request' '__hrtimer_run_queues' 01:19:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00000002c0)=0xece) fcntl$setsig(r1, 0xa, 0x12) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0xfffffced, 0x0, 0x0, 0x0, 0x1b7}}], 0xf575c7, 0x10000, 0x0) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x16) 01:19:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a4, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setopts(0x11, r2, 0x0, 0x200000000000030) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0x7ff, 0x1, {0x1, 0x0, 0x8}}) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xffeff034}, {0x80000006, 0x0, 0x0, 0x800}]}, 0x10) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000080)=0x4, 0x4) connect$inet(r5, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r5, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) syzkaller login: [ 59.810750][ T7679] IPVS: ftp: loaded support on port[0] = 21 [ 59.891039][ T7679] chnl_net:caif_netlink_parms(): no params data found [ 59.945275][ T7679] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.955271][ T7679] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.962908][ T7679] device bridge_slave_0 entered promiscuous mode [ 59.986681][ T7679] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.993897][ T7679] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.001761][ T7679] device bridge_slave_1 entered promiscuous mode [ 60.017414][ T7682] IPVS: ftp: loaded support on port[0] = 21 [ 60.021026][ T7679] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.034601][ T7679] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.053791][ T7679] team0: Port device team_slave_0 added [ 60.062666][ T7679] team0: Port device team_slave_1 added 01:19:36 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xeb, '\x00r%', "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"}}, 0x110) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) rt_tgsigqueueinfo(r1, r1, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) [ 60.167660][ T7679] device hsr_slave_0 entered promiscuous mode [ 60.205809][ T7679] device hsr_slave_1 entered promiscuous mode [ 60.351597][ T7679] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.358700][ T7679] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.366311][ T7679] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.373528][ T7679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.456670][ T7684] IPVS: ftp: loaded support on port[0] = 21 [ 60.481890][ T7682] chnl_net:caif_netlink_parms(): no params data found 01:19:37 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x854020, &(0x7f0000000280)='no\x00\x00ppp0em1\x00') [ 60.610789][ T7682] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.630337][ T7682] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.656001][ T7682] device bridge_slave_0 entered promiscuous mode [ 60.726182][ T7682] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.733318][ T7682] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.765909][ T7682] device bridge_slave_1 entered promiscuous mode [ 60.811945][ T7679] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.852596][ T7682] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.899856][ T2516] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.916308][ T2516] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.956484][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 61.004132][ T7682] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.093721][ T7712] IPVS: ftp: loaded support on port[0] = 21 [ 61.099535][ T7684] chnl_net:caif_netlink_parms(): no params data found [ 61.141496][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.167215][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.188236][ T7679] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.212196][ T7682] team0: Port device team_slave_0 added [ 61.256661][ T7682] team0: Port device team_slave_1 added [ 61.268917][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.287440][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.315998][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.323356][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.367001][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.396298][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.436207][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.443419][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.476057][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 01:19:38 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000080)={0x1, 0x1, 0x0, 0x49e3, 0x0, 0x8}, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0), 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x15, 0x80005, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 61.507989][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.536841][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.576587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.607437][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.642091][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.681043][ T7679] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 61.715750][ T7679] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.774159][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.783175][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.816249][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.841198][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.856986][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.879478][ T7684] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.887565][ T7684] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.896620][ T7684] device bridge_slave_0 entered promiscuous mode [ 61.913394][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:19:38 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000040)=""/64) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r1, 0x0, 0x16, &(0x7f0000000300)='lo!bdeveth0^mime_type\x00'}, 0x30) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {0x8, 0x1}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) setregid(0x0, 0x0) [ 61.998226][ T7682] device hsr_slave_0 entered promiscuous mode [ 62.035622][ T7682] device hsr_slave_1 entered promiscuous mode [ 62.125355][ T7682] debugfs: Directory 'hsr0' with parent '/' already present! [ 62.132978][ T7684] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.140263][ T7684] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.149467][ T7684] device bridge_slave_1 entered promiscuous mode [ 62.162586][ T7726] IPVS: ftp: loaded support on port[0] = 21 [ 62.168171][ T7684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.190308][ T7684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.205684][ T7728] IPVS: ftp: loaded support on port[0] = 21 [ 62.225059][ T7679] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.232062][ C0] ================================================================== [ 62.232103][ C0] BUG: KCSAN: data-race in add_timer / run_timer_softirq [ 62.232105][ C0] [ 62.232120][ C0] read to 0xffff88812be1b6c8 of 8 bytes by task 28 on cpu 1: [ 62.232136][ C0] add_timer+0x16f/0x550 [ 62.232153][ C0] __queue_delayed_work+0x13b/0x1d0 [ 62.232168][ C0] queue_delayed_work_on+0xf3/0x110 [ 62.232184][ C0] bond_netdev_notify_work+0x150/0x160 [ 62.232198][ C0] process_one_work+0x3d4/0x890 [ 62.232213][ C0] worker_thread+0xa0/0x800 [ 62.232225][ C0] kthread+0x1d4/0x200 [ 62.232238][ C0] ret_from_fork+0x1f/0x30 [ 62.232241][ C0] [ 62.232254][ C0] write to 0xffff88812be1b6c8 of 8 bytes by interrupt on cpu 0: [ 62.232269][ C0] run_timer_softirq+0xc14/0xcd0 [ 62.232285][ C0] __do_softirq+0x115/0x33f [ 62.232300][ C0] irq_exit+0xbb/0xe0 [ 62.232316][ C0] smp_apic_timer_interrupt+0xe6/0x280 [ 62.232330][ C0] apic_timer_interrupt+0xf/0x20 [ 62.232346][ C0] console_unlock+0x8fa/0xb80 [ 62.232359][ C0] vprintk_emit+0x38f/0x4e0 [ 62.232373][ C0] vprintk_default+0x31/0x50 [ 62.232388][ C0] vprintk_func+0x85/0x140 [ 62.232400][ C0] printk+0x69/0x91 [ 62.232420][ C0] vlan_device_event.cold+0x18/0x2c [ 62.232435][ C0] notifier_call_chain+0xd7/0x160 [ 62.232448][ C0] raw_notifier_call_chain+0x37/0x50 [ 62.232464][ C0] call_netdevice_notifiers_info+0x48/0xc0 [ 62.232477][ C0] __dev_notify_flags+0xcf/0x200 [ 62.232487][ C0] dev_change_flags+0xb8/0xe0 [ 62.232500][ C0] do_setlink+0x626/0x1fc0 [ 62.232513][ C0] __rtnl_newlink+0x93e/0x1010 [ 62.232531][ C0] rtnl_newlink+0x63/0x90 [ 62.232545][ C0] rtnetlink_rcv_msg+0x1d3/0x500 [ 62.232561][ C0] netlink_rcv_skb+0xb0/0x260 [ 62.232575][ C0] rtnetlink_rcv+0x26/0x30 [ 62.232587][ C0] netlink_unicast+0x354/0x430 [ 62.232600][ C0] netlink_sendmsg+0x456/0x770 [ 62.232614][ C0] sock_sendmsg+0x9f/0xc0 [ 62.232625][ C0] __sys_sendto+0x21f/0x320 [ 62.232636][ C0] __x64_sys_sendto+0x89/0xb0 [ 62.232652][ C0] do_syscall_64+0xcc/0x370 [ 62.232664][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 62.232667][ C0] [ 62.232670][ C0] Reported by Kernel Concurrency Sanitizer on: [ 62.232688][ C0] CPU: 0 PID: 7679 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 62.232697][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.232702][ C0] ================================================================== [ 62.232710][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 62.232727][ C0] CPU: 0 PID: 7679 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 62.232735][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.232740][ C0] Call Trace: [ 62.232745][ C0] [ 62.232766][ C0] dump_stack+0x11d/0x181 [ 62.232787][ C0] panic+0x210/0x640 [ 62.232805][ C0] ? vprintk_func+0x8d/0x140 [ 62.232828][ C0] kcsan_report.cold+0xc/0xd [ 62.232851][ C0] kcsan_setup_watchpoint+0x3fe/0x460 [ 62.232867][ C0] ? __next_timer_interrupt+0x190/0x190 [ 62.232883][ C0] __tsan_unaligned_write8+0xc4/0x100 [ 62.232904][ C0] run_timer_softirq+0xc14/0xcd0 [ 62.232924][ C0] ? kvm_sched_clock_read+0x9/0x20 [ 62.232942][ C0] ? sched_clock+0x13/0x20 [ 62.232959][ C0] ? sched_clock_cpu+0x15/0xe0 [ 62.232977][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 62.232998][ C0] __do_softirq+0x115/0x33f [ 62.233019][ C0] irq_exit+0xbb/0xe0 [ 62.233035][ C0] smp_apic_timer_interrupt+0xe6/0x280 [ 62.233054][ C0] apic_timer_interrupt+0xf/0x20 [ 62.233060][ C0] [ 62.233076][ C0] RIP: 0010:console_unlock+0x8fa/0xb80 [ 62.233094][ C0] Code: e8 eb 54 00 00 48 c7 c7 20 61 a5 85 e8 af d8 1a 00 48 83 3d c7 ff 6e 04 00 0f 84 69 02 00 00 e8 6c cb 0d 00 48 8b 7d a0 57 9d <0f> 1f 44 00 00 48 c7 c7 18 61 a5 85 e8 85 d8 1a 00 48 83 3d 95 ff [ 62.233101][ C0] RSP: 0018:ffffc900015f7220 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 62.233113][ C0] RAX: ffff88812aac9040 RBX: 0000000000000000 RCX: ffffffff86041ce8 [ 62.233120][ C0] RDX: 0000000000000000 RSI: ffffffff81366164 RDI: 0000000000000293 [ 62.233130][ C0] RBP: ffffc900015f7290 R08: 0000000000000000 R09: 0000ffff85a56120 [ 62.233141][ C0] R10: 0000ffff85a562b0 R11: 0000ffff85a56127 R12: ffffffff82e24420 [ 62.233150][ C0] R13: 0000000000000000 R14: 0000000000000001 R15: ffffc900015f7258 [ 62.233167][ C0] ? write_ext_msg+0x360/0x360 [ 62.233182][ C0] ? console_unlock+0x8f4/0xb80 [ 62.233203][ C0] vprintk_emit+0x38f/0x4e0 [ 62.233221][ C0] vprintk_default+0x31/0x50 [ 62.233236][ C0] vprintk_func+0x85/0x140 [ 62.233250][ C0] printk+0x69/0x91 [ 62.233272][ C0] ? inet6_ifinfo_notify+0xb4/0x120 [ 62.233286][ C0] ? vlan_device_event+0x1a0/0x1310 [ 62.233304][ C0] vlan_device_event.cold+0x18/0x2c [ 62.233318][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 62.233336][ C0] ? preempt_count_add+0x6f/0xb0 [ 62.233355][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 62.233372][ C0] ? device_event+0x86/0x1d0 [ 62.233388][ C0] notifier_call_chain+0xd7/0x160 [ 62.233406][ C0] raw_notifier_call_chain+0x37/0x50 [ 62.233421][ C0] call_netdevice_notifiers_info+0x48/0xc0 [ 62.233436][ C0] __dev_notify_flags+0xcf/0x200 [ 62.233455][ C0] dev_change_flags+0xb8/0xe0 [ 62.233473][ C0] do_setlink+0x626/0x1fc0 [ 62.233493][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 62.233512][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 62.233534][ C0] ? __nla_validate_parse+0xa0/0x1140 [ 62.233554][ C0] ? debug_smp_processor_id+0x3b/0x172 [ 62.233575][ C0] ? ___cache_free+0x2e/0x320 [ 62.233591][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 62.233609][ C0] ? __read_once_size+0xea/0x110 [ 62.233630][ C0] __rtnl_newlink+0x93e/0x1010 [ 62.233655][ C0] ? enqueue_timer+0x101/0x210 [ 62.233674][ C0] ? kfree_skbmem+0xe5/0x150 [ 62.233693][ C0] ? consume_skb+0xcc/0x1c0 [ 62.233712][ C0] ? nlmon_xmit+0xa1/0xb0 [ 62.233728][ C0] ? constant_test_bit+0x12/0x30 [ 62.233746][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 62.233760][ C0] ? dev_hard_start_xmit+0x1e5/0x430 [ 62.233779][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 62.233817][ C0] ? kmem_cache_alloc_trace+0x190/0x5d0 [ 62.233833][ C0] ? ns_capable_common+0xb4/0xc0 [ 62.233848][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 62.233862][ C0] ? __rtnl_newlink+0x1010/0x1010 [ 62.233877][ C0] rtnl_newlink+0x63/0x90 [ 62.233891][ C0] rtnetlink_rcv_msg+0x1d3/0x500 [ 62.233908][ C0] ? __rcu_read_unlock+0x66/0x3c0 [ 62.233923][ C0] netlink_rcv_skb+0xb0/0x260 [ 62.233936][ C0] ? rtnl_calcit.isra.0+0x220/0x220 [ 62.233954][ C0] rtnetlink_rcv+0x26/0x30 [ 62.233967][ C0] netlink_unicast+0x354/0x430 [ 62.233985][ C0] netlink_sendmsg+0x456/0x770 [ 62.234000][ C0] ? aa_sock_msg_perm.isra.0+0xa5/0x140 [ 62.234018][ C0] ? netlink_unicast+0x430/0x430 [ 62.234032][ C0] sock_sendmsg+0x9f/0xc0 [ 62.234047][ C0] __sys_sendto+0x21f/0x320 [ 62.234072][ C0] ? blkcg_maybe_throttle_current+0x472/0x610 [ 62.234087][ C0] ? _raw_spin_unlock_irq+0x68/0x80 [ 62.234107][ C0] ? mem_cgroup_handle_over_high+0x50/0x180 [ 62.234128][ C0] __x64_sys_sendto+0x89/0xb0 [ 62.234145][ C0] do_syscall_64+0xcc/0x370 [ 62.234161][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 62.234171][ C0] RIP: 0033:0x414373 [ 62.234187][ C0] Code: ff 0f 83 b0 19 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d fd 40 66 00 00 75 17 49 89 ca b8 2c 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 81 19 00 00 c3 48 83 ec 08 e8 87 fa ff ff [ 62.234194][ C0] RSP: 002b:00007ffcd7fe5758 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 62.234207][ C0] RAX: ffffffffffffffda RBX: 0000000000a72200 RCX: 0000000000414373 [ 62.234216][ C0] RDX: 000000000000002c RSI: 0000000000a72250 RDI: 0000000000000003 [ 62.234226][ C0] RBP: 0000000000000000 R08: 00007ffcd7fe5760 R09: 000000000000000c [ 62.234236][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 62.234246][ C0] R13: 0000000000000000 R14: 0000000000a72250 R15: 0000000000000003 [ 62.236171][ C0] Kernel Offset: disabled [ 63.044298][ C0] Rebooting in 86400 seconds..