Warning: Permanently added '10.128.0.74' (ECDSA) to the list of known hosts. 2020/01/28 17:12:32 fuzzer started syzkaller login: [ 62.904656][ T8037] as (8037) used greatest stack depth: 10056 bytes left 2020/01/28 17:12:35 dialing manager at 10.128.0.105:34991 2020/01/28 17:12:37 syscalls: 2900 2020/01/28 17:12:37 code coverage: enabled 2020/01/28 17:12:37 comparison tracing: enabled 2020/01/28 17:12:37 extra coverage: enabled 2020/01/28 17:12:37 setuid sandbox: enabled 2020/01/28 17:12:37 namespace sandbox: enabled 2020/01/28 17:12:37 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/28 17:12:37 fault injection: enabled 2020/01/28 17:12:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/28 17:12:37 net packet injection: enabled 2020/01/28 17:12:37 net device setup: enabled 2020/01/28 17:12:37 concurrency sanitizer: enabled 2020/01/28 17:12:37 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 69.735562][ T8044] KCSAN: could not find function: 'poll_schedule_timeout' 2020/01/28 17:12:42 adding functions to KCSAN blacklist: 'ip6_tnl_start_xmit' 'ext4_nonda_switch' '__ext4_new_inode' 'xas_clear_mark' 'echo_char' 'blk_mq_get_request' 'pid_update_inode' 'process_srcu' 'do_nanosleep' 'tomoyo_supervisor' 'ep_poll' 'find_get_pages_range_tag' 'tick_do_update_jiffies64' 'tick_sched_do_timer' '__hrtimer_run_queues' 'run_timer_softirq' 'poll_schedule_timeout' 'dd_has_work' 'kauditd_thread' 'pcpu_alloc' 'mod_timer' 'generic_fillattr' 'find_next_bit' 'do_syslog' 'generic_write_end' 'taskstats_exit' 17:13:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc}]}]}]}, 0x34}}, 0x0) [ 95.046451][ T8046] IPVS: ftp: loaded support on port[0] = 21 17:13:06 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/zoneinfo\x00', 0x0, 0x0) r2 = dup2(r0, r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'\x00', 0x0}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x8, &(0x7f0000000140)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270fff8a2eb21fba144e7da0f629fb4078533e2e7227178c092779b2827e784b54bf1be0247287ac543f6b0b287abbef6daf25cb209000000000000004d74337aa118763fb517e7f1b5c5c60670ccb6d139cd319404f61fee927be4bea0f14afa9ca9acd7f273e0f39f8c61327a9021deda36b415a83163067259de9479c7a6c4bdfa2746aa1b06234c10392753d16098309ee309158676449c26e51022e8c6efbdcc3c3792c4e3c09cebf7724bee4385c047c722c1ddc2a6d1ad84df3ff84e3fe5bfb676a191340a4a8a874fb38e1bc81baf5d52e90d6aba894be323392ced2a245c256b7af3ed76b338f44a1475a1", 0x81af8f65b352f434}], 0x2000, 0x0) [ 95.143449][ T8046] chnl_net:caif_netlink_parms(): no params data found [ 95.219601][ T8046] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.226715][ T8046] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.235647][ T8046] device bridge_slave_0 entered promiscuous mode [ 95.244031][ T8046] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.252117][ T8046] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.260770][ T8046] device bridge_slave_1 entered promiscuous mode [ 95.280786][ T8046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 95.291352][ T8046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 95.311874][ T8046] team0: Port device team_slave_0 added [ 95.319058][ T8046] team0: Port device team_slave_1 added [ 95.335505][ T8046] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 95.342823][ T8046] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 95.369892][ T8046] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 95.382026][ T8046] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 95.389097][ T8046] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 95.416238][ T8046] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 17:13:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192314834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) [ 95.433869][ T8049] IPVS: ftp: loaded support on port[0] = 21 [ 95.492262][ T8046] device hsr_slave_0 entered promiscuous mode [ 95.530205][ T8046] device hsr_slave_1 entered promiscuous mode [ 95.599498][ T10] ================================================================== [ 95.608326][ T10] BUG: KCSAN: data-race in rcu_gp_fqs_loop / rcu_preempt_deferred_qs_irqrestore [ 95.617468][ T10] [ 95.619951][ T10] write to 0xffffffff85c7d0d0 of 8 bytes by task 8046 on cpu 1: [ 95.627614][ T10] rcu_preempt_deferred_qs_irqrestore+0x43d/0x580 [ 95.634040][ T10] __rcu_read_unlock+0x16a/0x3d0 [ 95.638992][ T10] netlink_deliver_tap+0x81/0x4a0 [ 95.644027][ T10] netlink_unicast+0x43a/0x4d0 [ 95.648851][ T10] netlink_sendmsg+0x4d3/0x8b0 [ 95.655534][ T10] sock_sendmsg+0x9f/0xc0 [ 95.659966][ T10] __sys_sendto+0x21f/0x320 [ 95.664524][ T10] __x64_sys_sendto+0x89/0xb0 [ 95.669312][ T10] do_syscall_64+0xcc/0x3a0 [ 95.673971][ T10] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 95.679872][ T10] [ 95.682247][ T10] read to 0xffffffff85c7d0d0 of 8 bytes by task 10 on cpu 0: [ 95.689652][ T10] rcu_gp_fqs_loop+0x23c/0x580 [ 95.694423][ T10] rcu_gp_kthread+0x143/0x230 [ 95.699096][ T10] kthread+0x1d4/0x200 [ 95.703162][ T10] ret_from_fork+0x1f/0x30 [ 95.707722][ T10] [ 95.710048][ T10] Reported by Kernel Concurrency Sanitizer on: [ 95.716410][ T10] CPU: 0 PID: 10 Comm: rcu_preempt Not tainted 5.5.0-rc1-syzkaller #0 [ 95.724557][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.734615][ T10] ================================================================== [ 95.741279][ T8051] IPVS: ftp: loaded support on port[0] = 21 [ 95.742793][ T10] Kernel panic - not syncing: panic_on_warn set ... [ 95.755436][ T10] CPU: 0 PID: 10 Comm: rcu_preempt Not tainted 5.5.0-rc1-syzkaller #0 [ 95.757462][ T8049] chnl_net:caif_netlink_parms(): no params data found [ 95.763704][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.763709][ T10] Call Trace: [ 95.763734][ T10] dump_stack+0x11d/0x181 [ 95.763765][ T10] panic+0x210/0x640 [ 95.792377][ T10] ? vprintk_func+0x8d/0x140 [ 95.796988][ T10] kcsan_report.cold+0xc/0xd [ 95.801598][ T10] kcsan_setup_watchpoint+0x3fe/0x460 [ 95.807168][ T10] __tsan_read8+0xc6/0x100 [ 95.811646][ T10] rcu_gp_fqs_loop+0x23c/0x580 [ 95.816434][ T10] rcu_gp_kthread+0x143/0x230 [ 95.817205][ T8046] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 95.821144][ T10] kthread+0x1d4/0x200 [ 95.821162][ T10] ? rcu_gp_cleanup+0x520/0x520 [ 95.821192][ T10] ? kthread_unpark+0xe0/0xe0 [ 95.841983][ T10] ret_from_fork+0x1f/0x30 [ 95.848238][ T10] Kernel Offset: disabled [ 95.852587][ T10] Rebooting in 86400 seconds..