Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. 2019/10/22 14:49:48 fuzzer started 2019/10/22 14:49:49 dialing manager at 10.128.0.105:33369 2019/10/22 14:49:49 syscalls: 2524 2019/10/22 14:49:49 code coverage: enabled 2019/10/22 14:49:49 comparison tracing: enabled 2019/10/22 14:49:49 extra coverage: extra coverage is not supported by the kernel 2019/10/22 14:49:49 setuid sandbox: enabled 2019/10/22 14:49:49 namespace sandbox: enabled 2019/10/22 14:49:49 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/22 14:49:49 fault injection: enabled 2019/10/22 14:49:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/22 14:49:49 net packet injection: enabled 2019/10/22 14:49:49 net device setup: enabled 2019/10/22 14:49:49 concurrency sanitizer: enabled 14:49:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0}, 0x28) syzkaller login: [ 50.469174][ T7245] IPVS: ftp: loaded support on port[0] = 21 14:49:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x3800) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_UIE_OFF(r1, 0x7004) ioctl$RTC_UIE_ON(r1, 0x7003) [ 50.562915][ T7245] chnl_net:caif_netlink_parms(): no params data found [ 50.632671][ T7245] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.656812][ T7245] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.665010][ T7245] device bridge_slave_0 entered promiscuous mode [ 50.674424][ T7245] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.683074][ T7245] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.691820][ T7245] device bridge_slave_1 entered promiscuous mode [ 50.715804][ T7245] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.728224][ T7245] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.760001][ T7245] team0: Port device team_slave_0 added [ 50.778098][ T7245] team0: Port device team_slave_1 added [ 50.825004][ T7248] IPVS: ftp: loaded support on port[0] = 21 14:49:52 executing program 2: syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) creat(&(0x7f0000000240)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x89d5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 50.909786][ T7245] device hsr_slave_0 entered promiscuous mode [ 50.966412][ T7245] device hsr_slave_1 entered promiscuous mode [ 51.035323][ T7245] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.042474][ T7245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.049946][ T7245] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.057128][ T7245] bridge0: port 1(bridge_slave_0) entered forwarding state 14:49:53 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbffc010aeaf, &(0x7f0000000140)) [ 51.200451][ T7245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.229858][ T7251] IPVS: ftp: loaded support on port[0] = 21 [ 51.257132][ T3499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.278364][ T3499] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.307310][ T3499] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.327710][ T3499] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 51.386274][ T7245] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.423815][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.432887][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.440200][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.466869][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.475789][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.483135][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.495346][ T7248] chnl_net:caif_netlink_parms(): no params data found [ 51.524568][ T3499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.528759][ T7255] IPVS: ftp: loaded support on port[0] = 21 14:49:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x5000}, 0x1, 0xf0ffffff00000000}, 0x0) [ 51.568056][ T3499] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.579139][ T3499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.588798][ T3499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.599973][ T3499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.651525][ T7245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.697119][ T7248] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.704208][ T7248] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.713181][ T7248] device bridge_slave_0 entered promiscuous mode [ 51.747133][ T7245] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.789135][ T7248] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.808020][ T7248] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.816804][ T7248] device bridge_slave_1 entered promiscuous mode [ 51.893517][ T7260] IPVS: ftp: loaded support on port[0] = 21 [ 51.924966][ T7251] chnl_net:caif_netlink_parms(): no params data found [ 51.938455][ T7248] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.973479][ T7248] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.081171][ T7255] chnl_net:caif_netlink_parms(): no params data found [ 52.103564][ T7248] team0: Port device team_slave_0 added [ 52.119711][ T7251] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.132582][ T7251] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.144152][ T7251] device bridge_slave_0 entered promiscuous mode [ 52.152078][ T7251] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.159222][ T7251] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.168161][ T7251] device bridge_slave_1 entered promiscuous mode 14:49:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_vs\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000040)={@broadcast, @multicast1, @multicast2}, 0xc) r2 = socket(0x10, 0x80002, 0x0) sendfile(r2, r0, 0x0, 0xf0d) r3 = socket$inet(0x2, 0x3, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x83, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r4 = dup(0xffffffffffffffff) setsockopt$TIPC_GROUP_LEAVE(r4, 0x10f, 0x88) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 52.186523][ T7248] team0: Port device team_slave_1 added 14:49:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0}, 0x28) [ 52.279588][ T7248] device hsr_slave_0 entered promiscuous mode [ 52.316333][ T7248] device hsr_slave_1 entered promiscuous mode [ 52.356052][ T7248] debugfs: Directory 'hsr0' with parent '/' already present! [ 52.412681][ T7251] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.429128][ T7251] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.448654][ T7255] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.455795][ T7255] bridge0: port 1(bridge_slave_0) entered disabled state 14:49:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b70200000000009cbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000000000000004e060000000000000016a08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84452569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be27765b94f8f2879021c2ea53ea79acd7fb38fdf79f2be9087b7c4ae7dd5e4d068951d40c617b58c8108ddf12dddd4bfc6a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba70c3a912f01a201e694e3806e8c8fe8b8091627fcb311a55a9875c606bda873a4bca7f6cde352655635a650a5a7ad0a7b1d7d10e14b1e2375f6f55b52028d758d2f7085054567383f309336c34c06e751f94655df5e7c10b609acbe29dc3e031d116483efc20a8a74c01fd7edac55c37c6315005cf47f48ada3a6087af06d14a0763b43b7b71dd9e489900019c5ffbd57de9e149900274d19ac263ab6811c5856b54a7a1db331a641e77e817ab7bc09d87d8c2bd858830057ea46c6fa6bcafcb5b689b994ac44fdefcfe2c216aeb1572c7d01f88456c718ec4542d5e5d3daecacadb33d087bb10c3b7f0e48c26a0424d07152a4ac356d44a86fcda11459cd5707f895a9598e0434df80faa83e1121b184f9c7e3b6853ad2671a27cff78e766edaee3eb89d138ceeff21e72213dcce4194ffe2ea1a687390549e5dc82783f3f17115821b5d997e7d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0}, 0x28) [ 52.464719][ T7255] device bridge_slave_0 entered promiscuous mode [ 52.500745][ T7248] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.507868][ T7248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.515176][ T7248] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.522368][ T7248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.539738][ T7270] IPVS: ftp: loaded support on port[0] = 21 [ 52.548904][ T7255] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.556831][ T7255] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.564969][ T7255] device bridge_slave_1 entered promiscuous mode [ 52.588697][ T7251] team0: Port device team_slave_0 added [ 52.595781][ T7251] team0: Port device team_slave_1 added 14:49:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0}, 0x28) [ 52.612726][ T7260] chnl_net:caif_netlink_parms(): no params data found [ 52.625846][ T3499] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.634280][ T3499] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.714572][ T7255] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.732256][ T7248] 8021q: adding VLAN 0 to HW filter on device bond0 14:49:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b70200000000009cbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000000000000004e060000000000000016a08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84452569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be27765b94f8f2879021c2ea53ea79acd7fb38fdf79f2be9087b7c4ae7dd5e4d068951d40c617b58c8108ddf12dddd4bfc6a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba70c3a912f01a201e694e3806e8c8fe8b8091627fcb311a55a9875c606bda873a4bca7f6cde352655635a650a5a7ad0a7b1d7d10e14b1e2375f6f55b52028d758d2f7085054567383f309336c34c06e751f94655df5e7c10b609acbe29dc3e031d116483efc20a8a74c01fd7edac55c37c6315005cf47f48ada3a6087af06d14a0763b43b7b71dd9e489900019c5ffbd57de9e149900274d19ac263ab6811c5856b54a7a1db331a641e77e817ab7bc09d87d8c2bd858830057ea46c6fa6bcafcb5b689b994ac44fdefcfe2c216aeb1572c7d01f88456c718ec4542d5e5d3daecacadb33d087bb10c3b7f0e48c26a0424d07152a4ac356d44a86fcda11459cd5707f895a9598e0434df80faa83e1121b184f9c7e3b6853ad2671a27cff78e766edaee3eb89d138ceeff21e72213dcce4194ffe2ea1a687390549e5dc82783f3f17115821b5d997e7d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0}, 0x28) [ 52.760195][ T7255] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.783666][ T7248] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.859063][ T7251] device hsr_slave_0 entered promiscuous mode [ 52.886613][ T7251] device hsr_slave_1 entered promiscuous mode [ 52.906363][ T7251] debugfs: Directory 'hsr0' with parent '/' already present! [ 52.929084][ T7255] team0: Port device team_slave_0 added [ 52.936396][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.944265][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:49:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0}, 0x28) [ 52.978041][ T7255] team0: Port device team_slave_1 added [ 53.001255][ T7260] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.009146][ T7260] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.024739][ T7260] device bridge_slave_0 entered promiscuous mode [ 53.035042][ T7260] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.046343][ T7260] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.054359][ T7260] device bridge_slave_1 entered promiscuous mode [ 53.067351][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.077040][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.085680][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.092809][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.101538][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.110777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.119690][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.126844][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.134894][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.144265][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.153421][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.162270][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.171435][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.180353][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.203385][ T7248] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.214118][ T7248] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 14:49:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0}, 0x28) [ 53.237123][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.245535][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.254756][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.263858][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.272853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.281925][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.389180][ T7255] device hsr_slave_0 entered promiscuous mode [ 53.416404][ T7255] device hsr_slave_1 entered promiscuous mode [ 53.476175][ T7255] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.488206][ T7251] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.496973][ T7248] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.514478][ T7260] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.529529][ T7260] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:49:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000001701000002000000"], 0x10}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) [ 53.574921][ T7270] chnl_net:caif_netlink_parms(): no params data found [ 53.642997][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.651121][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.663121][ T7251] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.678381][ T7260] team0: Port device team_slave_0 added [ 53.713117][ T7260] team0: Port device team_slave_1 added [ 53.731255][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.750431][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.762223][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.769450][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.782702][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.791696][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.800490][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.807572][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.815661][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.831787][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.852411][ T7270] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.859664][ T7270] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.867825][ T7270] device bridge_slave_0 entered promiscuous mode [ 53.913993][ T7251] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.930027][ T7251] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.954608][ T7270] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.962200][ T7270] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.967568][ C1] hrtimer: interrupt took 31212 ns [ 53.973912][ T7270] device bridge_slave_1 entered promiscuous mode [ 53.991158][ T7255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.003300][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:49:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x3800) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_UIE_OFF(r1, 0x7004) ioctl$RTC_UIE_ON(r1, 0x7003) [ 54.027451][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.041838][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.052064][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.066334][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.075310][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.086169][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.095011][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.114757][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.169254][ T7260] device hsr_slave_0 entered promiscuous mode [ 54.206473][ T7260] device hsr_slave_1 entered promiscuous mode [ 54.256216][ T7260] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.270417][ T7251] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.292061][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.307912][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.328266][ T7270] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.340901][ T7255] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.357902][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.365884][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.376097][ T7270] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.411526][ T7270] team0: Port device team_slave_0 added [ 54.423711][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.432641][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.441665][ T7250] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.448904][ T7250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.457375][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.466215][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.474708][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.481820][ T7250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.489867][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.499048][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.508022][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.516900][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.525654][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.534921][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.544039][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.552759][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.561614][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.570399][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.580612][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.588997][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.600957][ T7270] team0: Port device team_slave_1 added [ 54.608360][ T7255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.622588][ T7260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.692816][ T7260] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.748766][ T7270] device hsr_slave_0 entered promiscuous mode [ 54.791483][ T7270] device hsr_slave_1 entered promiscuous mode [ 54.846189][ T7270] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.857397][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.865428][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.878008][ T7255] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.903502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.917626][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.936817][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.944009][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.955061][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.963884][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.973162][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.980334][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.988426][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.998522][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.008510][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.032498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.045666][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.059870][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.087790][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.098247][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.122980][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.144389][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.180177][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.194376][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.212740][ T7260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.252417][ T7260] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.265149][ T7270] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.292479][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.301126][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.311115][ T7270] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.351201][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.360582][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.372405][ T7250] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.379713][ T7250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.404049][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.412802][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.421853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.431096][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.438255][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.451900][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.470455][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.483106][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.497763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.512550][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.522572][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.538214][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.555653][ T7270] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.566989][ T7270] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.580840][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.590435][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.600083][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.614476][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.623962][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:49:57 executing program 2: syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) creat(&(0x7f0000000240)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x89d5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:49:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000001701000002000000"], 0x10}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) 14:49:57 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbffc010aeaf, &(0x7f0000000140)) [ 55.666686][ T7270] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.021283][ T7357] ================================================================== [ 56.029751][ T7357] BUG: KCSAN: data-race in __splice_from_pipe / pipe_poll [ 56.036872][ T7357] [ 56.039212][ T7357] read to 0xffff888104bb6f38 of 4 bytes by task 7353 on cpu 0: [ 56.046758][ T7357] pipe_poll+0x84/0x1d0 [ 56.051607][ T7357] do_select+0x7d0/0x1020 [ 56.055937][ T7357] core_sys_select+0x381/0x550 [ 56.060697][ T7357] do_pselect.constprop.0+0x11d/0x160 [ 56.066075][ T7357] __x64_sys_pselect6+0x12e/0x170 [ 56.071108][ T7357] do_syscall_64+0xcc/0x370 [ 56.075620][ T7357] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 56.081808][ T7357] [ 56.084257][ T7357] write to 0xffff888104bb6f38 of 4 bytes by task 7357 on cpu 1: [ 56.091875][ T7357] __splice_from_pipe+0x3ce/0x480 [ 56.097059][ T7357] do_vmsplice.part.0+0x1c5/0x210 [ 56.102078][ T7357] __do_sys_vmsplice+0x15f/0x1c0 [ 56.107280][ T7357] __x64_sys_vmsplice+0x5e/0x80 [ 56.112121][ T7357] do_syscall_64+0xcc/0x370 [ 56.116677][ T7357] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 56.122558][ T7357] [ 56.124883][ T7357] Reported by Kernel Concurrency Sanitizer on: [ 56.131044][ T7357] CPU: 1 PID: 7357 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 56.138834][ T7357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.148966][ T7357] ================================================================== [ 56.157247][ T7357] Kernel panic - not syncing: panic_on_warn set ... [ 56.163838][ T7357] CPU: 1 PID: 7357 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 56.171662][ T7357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.182186][ T7357] Call Trace: [ 56.185545][ T7357] dump_stack+0xf5/0x159 [ 56.189780][ T7357] panic+0x210/0x640 [ 56.193662][ T7357] ? vprintk_func+0x8d/0x140 [ 56.198326][ T7357] kcsan_report.cold+0xc/0x10 [ 56.203088][ T7357] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 56.208889][ T7357] __tsan_write4+0x32/0x40 [ 56.213294][ T7357] __splice_from_pipe+0x3ce/0x480 [ 56.218323][ T7357] ? iter_to_pipe+0x3f0/0x3f0 [ 56.222987][ T7357] do_vmsplice.part.0+0x1c5/0x210 [ 56.228000][ T7357] __do_sys_vmsplice+0x15f/0x1c0 [ 56.232922][ T7357] ? __tsan_read8+0x2c/0x30 [ 56.237450][ T7357] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 56.243162][ T7357] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 56.248775][ T7357] ? _copy_to_user+0x84/0xb0 [ 56.253434][ T7357] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 56.259047][ T7357] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 56.264709][ T7357] __x64_sys_vmsplice+0x5e/0x80 [ 56.269674][ T7357] do_syscall_64+0xcc/0x370 [ 56.274166][ T7357] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 56.280162][ T7357] RIP: 0033:0x459cd9 [ 56.284042][ T7357] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 56.303628][ T7357] RSP: 002b:00007fe283025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 56.312198][ T7357] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459cd9 [ 56.320166][ T7357] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000004 [ 56.328131][ T7357] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 56.336087][ T7357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2830266d4 [ 56.344062][ T7357] R13: 00000000004c97cc R14: 00000000004e11c8 R15: 00000000ffffffff [ 56.353669][ T7357] Kernel Offset: disabled [ 56.357999][ T7357] Rebooting in 86400 seconds..