Warning: Permanently added '10.128.1.9' (ECDSA) to the list of known hosts. 2019/11/05 14:33:21 fuzzer started 2019/11/05 14:33:23 dialing manager at 10.128.0.105:43787 2019/11/05 14:33:23 syscalls: 2553 2019/11/05 14:33:23 code coverage: enabled 2019/11/05 14:33:23 comparison tracing: enabled 2019/11/05 14:33:23 extra coverage: extra coverage is not supported by the kernel 2019/11/05 14:33:23 setuid sandbox: enabled 2019/11/05 14:33:23 namespace sandbox: enabled 2019/11/05 14:33:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 14:33:23 fault injection: enabled 2019/11/05 14:33:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 14:33:23 net packet injection: enabled 2019/11/05 14:33:23 net device setup: enabled 2019/11/05 14:33:23 concurrency sanitizer: enabled 2019/11/05 14:33:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/05 14:33:25 adding functions to KCSAN blacklist: 'ep_poll' 'tick_do_update_jiffies64' 'rcu_gp_fqs_check_wake' 'pid_update_inode' 'tcp_add_backlog' 'tick_sched_do_timer' 'find_next_bit' 'generic_write_end' 'generic_permission' 'blk_mq_sched_dispatch_requests' '__hrtimer_run_queues' 'tomoyo_supervisor' 'osq_lock' 'pipe_wait' 'pipe_poll' 14:33:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}}, {{&(0x7f0000000640)=@nl=@unspec, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 14:33:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) stat(0x0, 0x0) getegid() setresgid(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) utimes(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x7d, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8040fffffffd) syzkaller login: [ 69.833873][ T8058] IPVS: ftp: loaded support on port[0] = 21 [ 69.958191][ T8058] chnl_net:caif_netlink_parms(): no params data found [ 69.995682][ T8061] IPVS: ftp: loaded support on port[0] = 21 14:33:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x18475140f06794e8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d734c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca00000000000000", 0x600) sendfile(r1, r2, 0x0, 0x10000) perf_event_open$cgroup(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) times(0x0) r3 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYBLOB="c4008cf8", @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x4018000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x14, 0x5e, 0x1}, 0x14}}, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000049000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000240)={0x7974, 'syz1\x00'}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) [ 70.020216][ T8058] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.027532][ T8058] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.035627][ T8058] device bridge_slave_0 entered promiscuous mode [ 70.045868][ T8058] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.053460][ T8058] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.062352][ T8058] device bridge_slave_1 entered promiscuous mode [ 70.101000][ T8058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.120855][ T8058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.180805][ T8058] team0: Port device team_slave_0 added [ 70.198214][ T8058] team0: Port device team_slave_1 added [ 70.225705][ T8061] chnl_net:caif_netlink_parms(): no params data found [ 70.288999][ T8058] device hsr_slave_0 entered promiscuous mode [ 70.328153][ T8058] device hsr_slave_1 entered promiscuous mode 14:33:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000100)={'ip6_vti0\x00', @ifru_mtu}) [ 70.434420][ T8064] IPVS: ftp: loaded support on port[0] = 21 [ 70.513997][ T8061] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.569066][ T8061] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.608388][ T8061] device bridge_slave_0 entered promiscuous mode [ 70.649027][ T8061] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.656229][ T8061] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.685616][ T8061] device bridge_slave_1 entered promiscuous mode [ 70.729280][ T8058] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.736389][ T8058] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.743757][ T8058] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.750838][ T8058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.836183][ T8061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.887780][ T8061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.891774][ T8089] IPVS: ftp: loaded support on port[0] = 21 [ 70.999591][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.017416][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.040449][ T8061] team0: Port device team_slave_0 added [ 71.065213][ T8061] team0: Port device team_slave_1 added 14:33:30 executing program 4: socket$kcm(0x10, 0x2, 0x10) r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x25820, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, r0, 0x0) socket$key(0xf, 0x3, 0x2) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = inotify_init() fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) mmap$xdp(&(0x7f0000ff9000/0x4000)=nil, 0x600, 0x0, 0x11, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfe18, 0xfa00, {0x4}}, 0x20) r4 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x34254, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x0, r4, &(0x7f0000000040), 0x2, 0x0) sendmsg$key(r3, 0x0, 0x20004850) bind$inet(0xffffffffffffffff, 0x0, 0x5e) connect$inet(r1, 0x0, 0xfffffee6) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x121400, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) unshare(0x60000000) [ 71.268710][ T8061] device hsr_slave_0 entered promiscuous mode [ 71.336772][ T8061] device hsr_slave_1 entered promiscuous mode [ 71.376377][ T8061] debugfs: Directory 'hsr0' with parent '/' already present! [ 71.414682][ T8064] chnl_net:caif_netlink_parms(): no params data found [ 71.430655][ T8058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.492904][ T8089] chnl_net:caif_netlink_parms(): no params data found [ 71.599204][ T8058] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.671000][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.700272][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.778651][ T8089] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.785718][ T8089] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.860049][ T8089] device bridge_slave_0 entered promiscuous mode [ 71.910830][ T8089] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.976409][ T8089] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.984290][ T8089] device bridge_slave_1 entered promiscuous mode [ 72.084823][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.089377][ T8099] IPVS: ftp: loaded support on port[0] = 21 [ 72.127042][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.176693][ T2831] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.183858][ T2831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.229448][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.249736][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.276863][ T2831] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.284044][ T2831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.337012][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.365815][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.412103][ T8064] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.420408][ T8064] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.447196][ T8064] device bridge_slave_0 entered promiscuous mode [ 72.475617][ T8058] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 72.496359][ T8058] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 72.537482][ T8089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.557203][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.566050][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.597544][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.606146][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.637369][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.656360][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.665245][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.687233][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.695971][ T8064] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.709107][ T8064] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.737250][ T8064] device bridge_slave_1 entered promiscuous mode [ 72.782384][ T8089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.807659][ T8116] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.815928][ T8116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.860497][ T8058] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.923880][ T8116] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.937004][ T8116] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.947216][ T8064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.976290][ T8089] team0: Port device team_slave_0 added [ 72.983098][ T8089] team0: Port device team_slave_1 added [ 73.005507][ T8064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:33:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x5c, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0xb}, {0x4}}, {0x8}}}]}}]}, 0x5c}}, 0x0) [ 73.038212][ T8064] team0: Port device team_slave_0 added [ 73.125257][ T8064] team0: Port device team_slave_1 added [ 73.143021][ T8061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.259155][ T8064] device hsr_slave_0 entered promiscuous mode [ 73.326902][ T8064] device hsr_slave_1 entered promiscuous mode [ 73.356395][ T8064] debugfs: Directory 'hsr0' with parent '/' already present! [ 73.419590][ T8089] device hsr_slave_0 entered promiscuous mode [ 73.466774][ T8089] device hsr_slave_1 entered promiscuous mode [ 73.506387][ T8089] debugfs: Directory 'hsr0' with parent '/' already present! [ 73.571020][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.592586][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.648829][ T8061] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.795442][ T8099] chnl_net:caif_netlink_parms(): no params data found [ 73.889913][ T8117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.927029][ T8117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.935610][ T8117] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.942688][ T8117] bridge0: port 1(bridge_slave_0) entered forwarding state 14:33:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}}, {{&(0x7f0000000640)=@nl=@unspec, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) [ 74.197056][ T8117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.205738][ T8117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.290029][ C1] hrtimer: interrupt took 48362 ns [ 74.316578][ T8117] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.323770][ T8117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.424549][ T8117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.483793][ T8117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:33:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}}, {{&(0x7f0000000640)=@nl=@unspec, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) [ 74.564437][ T8130] IPVS: ftp: loaded support on port[0] = 21 [ 74.624125][ T8116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.657888][ T8116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.736758][ T8116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.745595][ T8116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.876615][ T8116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.886211][ T8116] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 75.080829][ T8117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.100608][ T8117] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.149751][ T8061] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 75.215963][ T8061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 75.281920][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.303106][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.374755][ T8099] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.383382][ T8166] ================================================================== [ 75.391625][ T8166] BUG: KCSAN: data-race in task_dump_owner / task_dump_owner [ 75.399009][ T8166] [ 75.401357][ T8166] write to 0xffff888124502d20 of 4 bytes by task 8168 on cpu 0: [ 75.408999][ T8166] task_dump_owner+0x246/0x260 [ 75.413769][ T8166] pid_update_inode+0x3c/0x70 [ 75.418477][ T8166] pid_revalidate+0x91/0xd0 [ 75.422994][ T8166] lookup_fast+0x6f2/0x700 [ 75.427418][ T8166] walk_component+0x6d/0xe70 [ 75.432023][ T8166] link_path_walk.part.0+0x5d3/0xa90 [ 75.437316][ T8166] path_openat+0x14f/0x36e0 [ 75.441822][ T8166] do_filp_open+0x11e/0x1b0 [ 75.446328][ T8166] do_sys_open+0x3b3/0x4f0 [ 75.450753][ T8166] __x64_sys_open+0x55/0x70 [ 75.455276][ T8166] do_syscall_64+0xcc/0x370 [ 75.459794][ T8166] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 75.466288][ T8166] [ 75.468629][ T8166] write to 0xffff888124502d20 of 4 bytes by task 8166 on cpu 1: [ 75.476271][ T8166] task_dump_owner+0x246/0x260 [ 75.481045][ T8166] pid_update_inode+0x3c/0x70 [ 75.485723][ T8166] pid_revalidate+0x91/0xd0 [ 75.490241][ T8166] lookup_fast+0x6f2/0x700 [ 75.494669][ T8166] walk_component+0x6d/0xe70 [ 75.499269][ T8166] link_path_walk.part.0+0x5d3/0xa90 [ 75.504571][ T8166] path_openat+0x14f/0x36e0 [ 75.509081][ T8166] do_filp_open+0x11e/0x1b0 [ 75.513594][ T8166] do_sys_open+0x3b3/0x4f0 [ 75.518196][ T8166] __x64_sys_open+0x55/0x70 14:33:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}}, {{&(0x7f0000000640)=@nl=@unspec, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) [ 75.522733][ T8166] do_syscall_64+0xcc/0x370 [ 75.527597][ T8166] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 75.533480][ T8166] [ 75.535802][ T8166] Reported by Kernel Concurrency Sanitizer on: [ 75.541960][ T8166] CPU: 1 PID: 8166 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 75.548716][ T8166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.558796][ T8166] ================================================================== [ 75.566866][ T8166] Kernel panic - not syncing: panic_on_warn set ... [ 75.573479][ T8166] CPU: 1 PID: 8166 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 75.580245][ T8166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.590311][ T8166] Call Trace: [ 75.593619][ T8166] dump_stack+0xf5/0x159 [ 75.597890][ T8166] panic+0x210/0x640 [ 75.601805][ T8166] ? vprintk_func+0x8d/0x140 [ 75.606407][ T8166] kcsan_report.cold+0xc/0xe [ 75.611021][ T8166] kcsan_setup_watchpoint+0x3fe/0x410 [ 75.616415][ T8166] __tsan_unaligned_write4+0x143/0x1f0 [ 75.621887][ T8166] task_dump_owner+0x246/0x260 [ 75.626765][ T8166] ? __rcu_read_unlock+0x66/0x3c0 [ 75.631811][ T8166] pid_update_inode+0x3c/0x70 [ 75.636503][ T8166] pid_revalidate+0x91/0xd0 [ 75.641043][ T8166] lookup_fast+0x6f2/0x700 [ 75.645495][ T8166] walk_component+0x6d/0xe70 [ 75.650111][ T8166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 75.656461][ T8166] ? security_inode_permission+0xa5/0xc0 [ 75.662138][ T8166] ? inode_permission+0xa0/0x3c0 [ 75.667096][ T8166] link_path_walk.part.0+0x5d3/0xa90 [ 75.672412][ T8166] path_openat+0x14f/0x36e0 [ 75.676962][ T8166] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 75.683218][ T8166] ? __virt_addr_valid+0x163/0x1e0 [ 75.688359][ T8166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 75.694621][ T8166] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 75.700531][ T8166] ? __read_once_size+0x41/0xe0 [ 75.705411][ T8166] do_filp_open+0x11e/0x1b0 [ 75.709945][ T8166] ? __alloc_fd+0x2ef/0x3b0 [ 75.714490][ T8166] do_sys_open+0x3b3/0x4f0 [ 75.718933][ T8166] __x64_sys_open+0x55/0x70 [ 75.723472][ T8166] do_syscall_64+0xcc/0x370 [ 75.727995][ T8166] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 75.733893][ T8166] RIP: 0033:0x7fcb8fbd9120 [ 75.738338][ T8166] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 75.758068][ T8166] RSP: 002b:00007ffdf9e77e68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 75.766487][ T8166] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fcb8fbd9120 [ 75.774474][ T8166] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fcb900a7d00 [ 75.782453][ T8166] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007fcb8fea157b [ 75.790430][ T8166] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb900a6d00 [ 75.798425][ T8166] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 75.808064][ T8166] Kernel Offset: disabled [ 75.812555][ T8166] Rebooting in 86400 seconds..