Warning: Permanently added '10.128.10.0' (ECDSA) to the list of known hosts. 2019/12/06 12:33:35 fuzzer started 2019/12/06 12:33:37 dialing manager at 10.128.0.105:36601 2019/12/06 12:33:41 syscalls: 2684 2019/12/06 12:33:41 code coverage: enabled 2019/12/06 12:33:41 comparison tracing: enabled 2019/12/06 12:33:41 extra coverage: extra coverage is not supported by the kernel 2019/12/06 12:33:41 setuid sandbox: enabled 2019/12/06 12:33:41 namespace sandbox: enabled 2019/12/06 12:33:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/06 12:33:41 fault injection: enabled 2019/12/06 12:33:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/06 12:33:41 net packet injection: enabled 2019/12/06 12:33:41 net device setup: enabled 2019/12/06 12:33:41 concurrency sanitizer: enabled 2019/12/06 12:33:41 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 61.166070][ T7673] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/06 12:33:47 adding functions to KCSAN blacklist: 'tick_sched_do_timer' 'blk_mq_get_request' 'find_get_pages_range_tag' 'tick_do_update_jiffies64' 'poll_schedule_timeout' 'do_nanosleep' 'do_signal_stop' 'ext4_mb_good_group' 'lookup_fast' 'tomoyo_check_acl' 'generic_write_end' 'ep_poll' 'flush_workqueue' 'ext4_free_inodes_count' 'tomoyo_supervisor' 'blk_mq_dispatch_rq_list' 'rcu_gp_fqs_check_wake' '__fsnotify_parent' 'tick_nohz_idle_stop_tick' 'kauditd_thread' 'pipe_wait' 'pipe_poll' 'ext4_has_free_clusters' 'mem_cgroup_select_victim_node' 'wbt_done' 'fuse_get_req' 'taskstats_exit' '__ext4_new_inode' 'dd_has_work' 'ext4_free_inode' 'run_timer_softirq' 'fasync_remove_entry' 'tcp_add_backlog' 'find_next_bit' 'xas_clear_mark' 'audit_log_start' 'pcpu_alloc' '__snd_rawmidi_transmit_ack' 'do_syslog' 'mod_timer' 'lruvec_lru_size' 'add_timer' '__hrtimer_run_queues' 'ext4_nonda_switch' 'vm_area_dup' 12:34:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x15, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 12:34:53 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000000000e458c598ba4904c77813ab29fb450a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45e2584f446722053f1502598808b355f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d912967"], 0x18}}], 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x550, 0x118, 0x0, 0x0, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@arp={@multicast1, @broadcast, 0x0, 0x0, @mac=@remote, {}, @mac=@local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bond\x00', 'ifb0\x00'}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'u:r:untrusted_app:s0:c512,c768\x00'}}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0x0, 0x0, @empty, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'teql0\x00', 'yam0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) [ 132.810209][ T7675] IPVS: ftp: loaded support on port[0] = 21 [ 132.897430][ T7675] chnl_net:caif_netlink_parms(): no params data found [ 132.978921][ T7675] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.995171][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.004059][ T7675] device bridge_slave_0 entered promiscuous mode [ 133.012225][ T7675] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.019437][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.029274][ T7675] device bridge_slave_1 entered promiscuous mode [ 133.041669][ T7678] IPVS: ftp: loaded support on port[0] = 21 [ 133.058496][ T7675] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 12:34:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x1e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x2000000003}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_UIE_OFF(r1, 0x7004) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) [ 133.083315][ T7675] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 133.127023][ T7675] team0: Port device team_slave_0 added [ 133.133952][ T7675] team0: Port device team_slave_1 added 12:34:54 executing program 3: mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0\x05\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r7, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f00000005c0)={0x34, 0x0, &(0x7f0000000580)}) sendmsg$FOU_CMD_ADD(r5, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="200029bd7000fddbdf250100000008000600ac1e000108000800ac1414290400050014000900fe80000000000000000000000000002a408490745f33b1b09c8b64206283334210e28b746ccc81df04007642ed36a51f4c78ed411452541b6de54323c87236a9c062c50073a3d0bee88a51cb94a0dbc7dd39b5e8c036ff8f5a675b7d833a0eebd5d19aa414217dd3aa587f6dd0f6ca13f8092e1d7b932cc2eff3c6620170e406d1fd2c9f4097cf9e2af932521dec7f4209d17ee6f64735de87"], 0x3c}, 0x1, 0x0, 0x0, 0x4000001}, 0xbe80c419b7a7a1ad) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000005391b1d923cea080122ee9886b31c6310254e6bd02e76511ffa7524cb17d6220e582b3fea5e789b64c3f7a48fdeacdfb9325b5563aa975ce1ca7f725ffd051d8a582393faf63757eee52f6b1fd138fea3272a98eb14ffbfb805742d3f9dc1c7022f4052ab1701fe0f7d9159c2a2962cd90603e18e26a78bcabb3e4a05e188fdb"], &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r8, 0x800, 0x10}, 0xc) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) [ 133.287185][ T7675] device hsr_slave_0 entered promiscuous mode [ 133.385450][ T7675] device hsr_slave_1 entered promiscuous mode [ 133.463923][ T7678] chnl_net:caif_netlink_parms(): no params data found [ 133.467926][ T7681] IPVS: ftp: loaded support on port[0] = 21 [ 133.509340][ T7683] IPVS: ftp: loaded support on port[0] = 21 [ 133.627690][ T7675] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.635031][ T7675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.642343][ T7675] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.649423][ T7675] bridge0: port 1(bridge_slave_0) entered forwarding state 12:34:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x7, 0x4) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="a43f97f95e587f921e41635f68e47c7a10bc918dba707335df9c4fe2e3dd545ee4a95fc838fdcc46a7540a012dcf04a12f99172a6f3583cd5498000448f3ae533c2845496e9b0a050d5e4e05f5f8188edecc091727ed7a25a91998bf61aeec90e8718f9aa9fd5da3aa3181c0080975dee42b7d8686ca8f92f314380c2a02a90e6efeaf9d6acdb213cd260c116f495d9569a33c798d369967f6690fd59a8b3bd789702d552fe262fe738e874609724467e7d1be8518f803b96022e1f0f1de7d3720bec96ede000000000000000000"], 0x10098) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9f"], 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}}, 0x38) [ 133.731355][ T7678] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.759140][ T7678] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.806146][ T7678] device bridge_slave_0 entered promiscuous mode [ 133.850065][ T7678] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.878651][ T7678] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.907011][ T7678] device bridge_slave_1 entered promiscuous mode [ 133.932416][ T3012] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.966310][ T3012] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.079187][ T7681] chnl_net:caif_netlink_parms(): no params data found [ 134.180889][ T7678] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 134.217342][ T7678] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 134.285243][ T7678] team0: Port device team_slave_0 added [ 134.293440][ T7678] team0: Port device team_slave_1 added [ 134.337968][ T7711] IPVS: ftp: loaded support on port[0] = 21 [ 134.368859][ T7675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.415786][ T7681] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.422864][ T7681] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.466990][ T7681] device bridge_slave_0 entered promiscuous mode [ 134.495390][ T7681] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.502456][ T7681] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.535906][ T7681] device bridge_slave_1 entered promiscuous mode 12:34:55 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc040565f, &(0x7f0000000000)={0xa, @vbi={0x7, 0x0, 0x0, 0x35315241, [0x6]}}) [ 134.628823][ T7678] device hsr_slave_0 entered promiscuous mode [ 134.655411][ T7678] device hsr_slave_1 entered promiscuous mode [ 134.695142][ T7678] debugfs: Directory 'hsr0' with parent '/' already present! [ 134.719616][ T7683] chnl_net:caif_netlink_parms(): no params data found [ 134.797603][ T7675] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.808731][ T7681] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 134.838699][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.857028][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.918393][ T7681] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 134.962425][ T7683] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.977223][ T7683] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.985003][ T7683] device bridge_slave_0 entered promiscuous mode [ 135.029269][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.045746][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.085678][ T7709] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.092813][ T7709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.131072][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.165815][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.195376][ T7709] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.202440][ T7709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.235723][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 135.279407][ T7683] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.295160][ T7683] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.315238][ T7683] device bridge_slave_1 entered promiscuous mode [ 135.375523][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 135.387113][ T7681] team0: Port device team_slave_0 added [ 135.408505][ T7718] IPVS: ftp: loaded support on port[0] = 21 [ 135.438001][ T7683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 135.465887][ T7681] team0: Port device team_slave_1 added [ 135.476380][ T7683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 135.519454][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 135.529668][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 135.545915][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.578089][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.595919][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.627667][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.655910][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.675750][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.699519][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.718121][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.806646][ T7675] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 135.862407][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 135.875409][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 135.890992][ T7683] team0: Port device team_slave_0 added [ 135.911661][ T7678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.979322][ T7681] device hsr_slave_0 entered promiscuous mode [ 136.055780][ T7681] device hsr_slave_1 entered promiscuous mode [ 136.095171][ T7681] debugfs: Directory 'hsr0' with parent '/' already present! [ 136.103513][ T7683] team0: Port device team_slave_1 added [ 136.139858][ T7678] 8021q: adding VLAN 0 to HW filter on device team0 [ 136.166756][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.174569][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.276478][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 136.320880][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.395616][ T7709] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.402692][ T7709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.478073][ T7711] chnl_net:caif_netlink_parms(): no params data found [ 136.539896][ T7683] device hsr_slave_0 entered promiscuous mode [ 136.605483][ T7683] device hsr_slave_1 entered promiscuous mode [ 136.647868][ T7683] debugfs: Directory 'hsr0' with parent '/' already present! [ 136.684919][ T7678] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 136.737468][ T7678] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 136.766238][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 136.774257][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.815531][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.824009][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.831185][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.875726][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 136.884675][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 136.906312][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 136.914994][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 136.936256][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 136.965835][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 136.974518][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.005794][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.014778][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.045921][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.098187][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.148468][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 137.210947][ T7718] chnl_net:caif_netlink_parms(): no params data found [ 137.305621][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 137.313102][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 137.421574][ T7678] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 137.435587][ T7711] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.442775][ T7711] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.459075][ T7711] device bridge_slave_0 entered promiscuous mode [ 137.540870][ T7711] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.559399][ T7711] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.585954][ T7711] device bridge_slave_1 entered promiscuous mode [ 137.605485][ T7718] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.623611][ T7718] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.661406][ T7718] device bridge_slave_0 entered promiscuous mode [ 137.705460][ T7718] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.712791][ T7718] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.735839][ T7718] device bridge_slave_1 entered promiscuous mode [ 137.836868][ T7711] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 137.876542][ T7718] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 137.914524][ T7681] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.949885][ T7711] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 137.976702][ T7718] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 138.003011][ T7683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.067723][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.081180][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.105340][ T7711] team0: Port device team_slave_0 added [ 138.117189][ T7681] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.131877][ T7718] team0: Port device team_slave_0 added [ 138.143422][ T7718] team0: Port device team_slave_1 added [ 138.179482][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.205804][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.236808][ T7683] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.244782][ T7711] team0: Port device team_slave_1 added [ 138.298436][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.321067][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.365526][ T7707] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.372718][ T7707] bridge0: port 1(bridge_slave_0) entered forwarding state 12:34:59 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000000000e458c598ba4904c77813ab29fb450a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45e2584f446722053f1502598808b355f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d912967"], 0x18}}], 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x550, 0x118, 0x0, 0x0, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@arp={@multicast1, @broadcast, 0x0, 0x0, @mac=@remote, {}, @mac=@local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bond\x00', 'ifb0\x00'}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'u:r:untrusted_app:s0:c512,c768\x00'}}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0x0, 0x0, @empty, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'teql0\x00', 'yam0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) [ 138.416716][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.443900][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.492880][ T7707] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.499988][ T7707] bridge0: port 1(bridge_slave_0) entered forwarding state 12:34:59 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000000000e458c598ba4904c77813ab29fb450a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45e2584f446722053f1502598808b355f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d912967"], 0x18}}], 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x550, 0x118, 0x0, 0x0, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@arp={@multicast1, @broadcast, 0x0, 0x0, @mac=@remote, {}, @mac=@local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bond\x00', 'ifb0\x00'}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'u:r:untrusted_app:s0:c512,c768\x00'}}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0x0, 0x0, @empty, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'teql0\x00', 'yam0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) [ 138.552330][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.587845][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.625696][ T7707] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.632858][ T7707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.680314][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.721433][ T7718] device hsr_slave_0 entered promiscuous mode [ 138.797985][ T7718] device hsr_slave_1 entered promiscuous mode [ 138.825269][ T7718] debugfs: Directory 'hsr0' with parent '/' already present! [ 138.849817][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.865778][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.893999][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.924304][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.945700][ T3018] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.952771][ T3018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.979012][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.996183][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.014482][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.048310][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 139.060003][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 139.082435][ T7807] ================================================================== [ 139.090663][ T7807] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 139.098194][ T7807] [ 139.100524][ T7807] read to 0xffff8881251fdd68 of 2 bytes by task 7803 on cpu 0: [ 139.108070][ T7807] pid_update_inode+0x25/0x70 [ 139.113013][ T7807] pid_revalidate+0x91/0xd0 [ 139.117519][ T7807] lookup_fast+0x6f2/0x700 [ 139.121959][ T7807] walk_component+0x6d/0xe70 [ 139.126570][ T7807] link_path_walk.part.0+0x5d3/0xa90 [ 139.131876][ T7807] path_openat+0x14f/0x36e0 [ 139.136384][ T7807] do_filp_open+0x11e/0x1b0 [ 139.140894][ T7807] do_sys_open+0x3b3/0x4f0 [ 139.145310][ T7807] __x64_sys_open+0x55/0x70 [ 139.149808][ T7807] do_syscall_64+0xcc/0x370 [ 139.155358][ T7807] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.161238][ T7807] [ 139.163568][ T7807] write to 0xffff8881251fdd68 of 2 bytes by task 7807 on cpu 1: [ 139.171991][ T7807] pid_update_inode+0x51/0x70 [ 139.176754][ T7807] pid_revalidate+0x91/0xd0 [ 139.181873][ T7807] lookup_fast+0x6f2/0x700 [ 139.186288][ T7807] walk_component+0x6d/0xe70 [ 139.190878][ T7807] link_path_walk.part.0+0x5d3/0xa90 [ 139.196353][ T7807] path_openat+0x14f/0x36e0 [ 139.200861][ T7807] do_filp_open+0x11e/0x1b0 [ 139.205363][ T7807] do_sys_open+0x3b3/0x4f0 [ 139.209775][ T7807] __x64_sys_open+0x55/0x70 [ 139.214286][ T7807] do_syscall_64+0xcc/0x370 [ 139.219400][ T7807] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.225284][ T7807] [ 139.227609][ T7807] Reported by Kernel Concurrency Sanitizer on: [ 139.233858][ T7807] CPU: 1 PID: 7807 Comm: ps Not tainted 5.4.0-syzkaller #0 12:35:00 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000100100000100000005e8000000000000e458c598ba4904c77813ab29fb450a2e834efe3f87695931515781ae36a4d148f269399022f544be4fac9508cce4df4d7015eb590bbfb45e2584f446722053f1502598808b355f7b815bdb2281145dd688759944bd09b0f55e7ca54b07bd9189de8daeb173aca360f4bca4f5019235efcea227e56f94ddc8d5e02f38fdcdad2e5cc22b1f090ecf60605f3d912967"], 0x18}}], 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x550, 0x118, 0x0, 0x0, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@arp={@multicast1, @broadcast, 0x0, 0x0, @mac=@remote, {}, @mac=@local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bond\x00', 'ifb0\x00'}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'u:r:untrusted_app:s0:c512,c768\x00'}}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0x0, 0x0, @empty, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'teql0\x00', 'yam0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) [ 139.241071][ T7807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.251151][ T7807] ================================================================== [ 139.259219][ T7807] Kernel panic - not syncing: panic_on_warn set ... [ 139.265815][ T7807] CPU: 1 PID: 7807 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 139.273019][ T7807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.283073][ T7807] Call Trace: [ 139.286499][ T7807] dump_stack+0x11d/0x181 [ 139.290861][ T7807] panic+0x210/0x640 [ 139.294768][ T7807] ? vprintk_func+0x8d/0x140 12:35:00 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x4, &(0x7f0000000000), 0x4) [ 139.299369][ T7807] kcsan_report.cold+0xc/0xd [ 139.303972][ T7807] kcsan_setup_watchpoint+0x3fe/0x460 [ 139.309364][ T7807] __tsan_unaligned_write2+0xc4/0x100 [ 139.314746][ T7807] pid_update_inode+0x51/0x70 [ 139.319425][ T7807] pid_revalidate+0x91/0xd0 [ 139.323936][ T7807] lookup_fast+0x6f2/0x700 [ 139.328369][ T7807] walk_component+0x6d/0xe70 [ 139.332994][ T7807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.339252][ T7807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.345530][ T7807] ? security_inode_permission+0xa5/0xc0 [ 139.351166][ T7807] ? inode_permission+0xa0/0x3c0 [ 139.356125][ T7807] link_path_walk.part.0+0x5d3/0xa90 [ 139.361436][ T7807] path_openat+0x14f/0x36e0 [ 139.365952][ T7807] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 139.371863][ T7807] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 139.378114][ T7807] ? __rcu_read_unlock+0x66/0x3c0 [ 139.383156][ T7807] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 139.389061][ T7807] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 139.394956][ T7807] ? __read_once_size+0x41/0xe0 12:35:00 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x4, &(0x7f0000000000), 0x4) [ 139.399812][ T7807] do_filp_open+0x11e/0x1b0 [ 139.404322][ T7807] ? __alloc_fd+0x2ef/0x3b0 [ 139.408837][ T7807] do_sys_open+0x3b3/0x4f0 [ 139.413266][ T7807] __x64_sys_open+0x55/0x70 [ 139.417769][ T7807] do_syscall_64+0xcc/0x370 [ 139.422279][ T7807] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.428169][ T7807] RIP: 0033:0x7f4428072120 12:35:00 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x4, &(0x7f0000000000), 0x4) [ 139.432595][ T7807] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 139.452201][ T7807] RSP: 002b:00007fff7dedacb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 139.460623][ T7807] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f4428072120 [ 139.468600][ T7807] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f4428540d00 [ 139.476591][ T7807] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f442833aa10 [ 139.484565][ T7807] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f442853fd00 [ 139.492546][ T7807] R13: 00000000018671c0 R14: 0000000000000005 R15: 0000000000000000 [ 139.502069][ T7807] Kernel Offset: disabled [ 139.506449][ T7807] Rebooting in 86400 seconds..