Warning: Permanently added '10.128.0.242' (ECDSA) to the list of known hosts. 2019/12/04 12:20:22 fuzzer started 2019/12/04 12:20:24 dialing manager at 10.128.0.26:36481 2019/12/04 12:20:24 syscalls: 2691 2019/12/04 12:20:24 code coverage: enabled 2019/12/04 12:20:24 comparison tracing: enabled 2019/12/04 12:20:24 extra coverage: extra coverage is not supported by the kernel 2019/12/04 12:20:24 setuid sandbox: enabled 2019/12/04 12:20:24 namespace sandbox: enabled 2019/12/04 12:20:24 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/04 12:20:24 fault injection: enabled 2019/12/04 12:20:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/04 12:20:24 net packet injection: enabled 2019/12/04 12:20:24 net device setup: enabled 2019/12/04 12:20:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/04 12:20:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 12:20:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x10}}], 0x10}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x7c72b077e3fd11f7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 12:20:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000001000000000000005a4085000000170000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="54a2e72c79ee0e93fdacdfc36de4", 0x0, 0xd39}, 0x28) [ 60.619598][ T8429] IPVS: ftp: loaded support on port[0] = 21 [ 60.756236][ T8429] chnl_net:caif_netlink_parms(): no params data found [ 60.800738][ T8429] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.811001][ T8429] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.819598][ T8429] device bridge_slave_0 entered promiscuous mode [ 60.829691][ T8429] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.837369][ T8429] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.846556][ T8429] device bridge_slave_1 entered promiscuous mode [ 60.874375][ T8429] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.886812][ T8429] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.914467][ T8429] team0: Port device team_slave_0 added 12:20:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfea2, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 60.923823][ T8429] team0: Port device team_slave_1 added [ 60.936971][ T8432] IPVS: ftp: loaded support on port[0] = 21 [ 60.983938][ T8429] device hsr_slave_0 entered promiscuous mode [ 61.021390][ T8429] device hsr_slave_1 entered promiscuous mode 12:20:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r2 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e21, @loopback}, 0x10) [ 61.153573][ T8429] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 61.223970][ T8429] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 61.266946][ T8429] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 61.327350][ T8429] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 61.343754][ T8434] IPVS: ftp: loaded support on port[0] = 21 12:20:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {0x0}], 0x2}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 61.423643][ T8436] IPVS: ftp: loaded support on port[0] = 21 [ 61.426042][ T8429] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.436986][ T8429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.444940][ T8429] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.452053][ T8429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.577339][ T8432] chnl_net:caif_netlink_parms(): no params data found [ 61.732843][ T8429] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.758389][ T8441] IPVS: ftp: loaded support on port[0] = 21 12:20:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='udf\x00P\xea\x9d\xae\x99\x8fS\x13#LD\xbe\xd6\vE\xcc\xb2\xd2\xbb\xa0\x1f\'ID`\xec1\xe1\xe2\x9dD\xd4\xef;\x84=\x9f1\xea\xb1\x1f\x8f\xc1\xecek\xdd\b5\xd9\xdf\xcf\xf3\n<\xbdL\xc5v\xb9\xdf\x02\x00\x00\x00\x00\x00\x00\x00+5}{o%\x1f\xd4\xe0 [ 169.477048][ C1] sched_show_task+0x40f/0x560 [ 169.481807][ C1] rcu_sched_clock_irq+0x16b1/0x1ad0 [ 169.487225][ C1] update_process_times+0x12d/0x180 [ 169.492425][ C1] tick_sched_timer+0x263/0x420 [ 169.497279][ C1] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 169.502824][ C1] __hrtimer_run_queues+0x403/0x840 [ 169.508032][ C1] hrtimer_interrupt+0x38c/0xda0 [ 169.512974][ C1] ? debug_smp_processor_id+0x9/0x20 [ 169.518273][ C1] smp_apic_timer_interrupt+0x109/0x280 [ 169.523835][ C1] apic_timer_interrupt+0xf/0x20 [ 169.528948][ C1] [ 169.531879][ C1] RIP: 0010:mod_memcg_page_state+0xb/0x190 [ 169.537688][ C1] Code: 8b 26 2e 00 eb 05 e8 84 26 2e 00 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 54 53 <41> 89 f6 48 89 fb e8 5a 26 2e 00 48 83 c3 38 48 89 d8 48 c1 e8 03 [ 169.557583][ C1] RSP: 0018:ffffc90002017928 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 169.566079][ C1] RAX: 1ffff1100d85d101 RBX: ffff88806c2e8808 RCX: 0000000000000000 [ 169.574057][ C1] RDX: 0000000000000000 RSI: 00000000fffffffc RDI: ffffea0002426e00 [ 169.582035][ C1] RBP: ffffc90002017948 R08: 000000000003a728 R09: ffffed1014e6ee9f [ 169.590045][ C1] R10: ffffed1014e6ee9f R11: 0000000000000000 R12: ffff88806c2e88a0 [ 169.598159][ C1] R13: dffffc0000000000 R14: 1ffff1100d85d114 R15: ffff8880a73774e8 [ 169.606183][ C1] free_thread_stack+0x168/0x590 [ 169.611255][ C1] put_task_stack+0xa3/0x130 [ 169.615953][ C1] finish_task_switch+0x3f1/0x550 [ 169.620983][ C1] __schedule+0x9a8/0xcc0 [ 169.625319][ C1] ? ___preempt_schedule+0x16/0x18 [ 169.630603][ C1] preempt_schedule+0xdb/0x120 [ 169.635361][ C1] ___preempt_schedule+0x16/0x18 [ 169.640308][ C1] ? __wake_up_sync_key+0xe2/0x150 [ 169.645437][ C1] _raw_spin_unlock_irqrestore+0xcc/0xe0 [ 169.651065][ C1] __wake_up_sync_key+0xe2/0x150 [ 169.656005][ C1] sock_def_readable+0x162/0x200 [ 169.660937][ C1] unix_dgram_sendmsg+0x1bd5/0x2690 [ 169.666138][ C1] ? __sys_sendmsg+0x20b/0x290 [ 169.670896][ C1] ? unix_dgram_poll+0x6b0/0x6b0 [ 169.675828][ C1] __sys_sendto+0x442/0x5e0 [ 169.680343][ C1] ? debug_smp_processor_id+0x1c/0x20 [ 169.685715][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 169.691911][ C1] ? prepare_exit_to_usermode+0x221/0x5b0 [ 169.697642][ C1] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 169.703357][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 169.708810][ C1] __x64_sys_sendto+0xe5/0x100 [ 169.713569][ C1] do_syscall_64+0xf7/0x1c0 [ 169.718063][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.723942][ C1] RIP: 0033:0x7f38509b9282 [ 169.728350][ C1] Code: 48 83 c8 ff eb ea 90 90 53 48 83 ec 20 8b 05 81 d3 2a 00 85 c0 75 21 45 31 c9 45 31 c0 4c 63 d1 48 63 ff b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 61 48 83 c4 20 5b c3 48 89 54 24 08 89 0c 24 [ 169.748138][ C1] RSP: 002b:00007ffcd8ff06b0 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 169.756543][ C1] RAX: ffffffffffffffda RBX: 0000000000f5ed20 RCX: 00007f38509b9282 [ 169.764765][ C1] RDX: 0000000000000008 RSI: 00007ffcd8ff0700 RDI: 0000000000000009 [ 169.772728][ C1] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 169.780692][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 169.788653][ C1] R13: 0000000000f5f1a0 R14: 0000000000f5c250 R15: 000000000000000b [ 169.796664][ C1] rcu: rcu_preempt kthread starved for 10537 jiffies! g6813 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 169.808056][ C1] rcu: RCU grace-period kthread stack dump: [ 169.813943][ C1] rcu_preempt I29032 10 2 0x80004000 [ 169.820276][ C1] Call Trace: [ 169.823588][ C1] __schedule+0x9a0/0xcc0 [ 169.827928][ C1] schedule+0x181/0x210 [ 169.832172][ C1] schedule_timeout+0x14f/0x240 [ 169.839357][ C1] ? run_local_timers+0x120/0x120 [ 169.844376][ C1] rcu_gp_kthread+0xed8/0x1770 [ 169.849138][ C1] kthread+0x332/0x350 [ 169.853192][ C1] ? rcu_report_qs_rsp+0x140/0x140 [ 169.858289][ C1] ? kthread_blkcg+0xe0/0xe0 [ 169.862887][ C1] ret_from_fork+0x24/0x30