Warning: Permanently added '10.128.0.253' (ECDSA) to the list of known hosts. 2019/10/17 14:40:54 fuzzer started 2019/10/17 14:40:56 dialing manager at 10.128.0.105:43535 2019/10/17 14:40:56 syscalls: 2524 2019/10/17 14:40:56 code coverage: enabled 2019/10/17 14:40:56 comparison tracing: enabled 2019/10/17 14:40:56 extra coverage: extra coverage is not supported by the kernel 2019/10/17 14:40:56 setuid sandbox: enabled 2019/10/17 14:40:56 namespace sandbox: enabled 2019/10/17 14:40:56 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/17 14:40:56 fault injection: enabled 2019/10/17 14:40:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/17 14:40:56 net packet injection: enabled 2019/10/17 14:40:56 net device setup: enabled 2019/10/17 14:40:56 concurrency sanitizer: enabled 14:40:58 executing program 0: r0 = socket$kcm(0x10, 0x100000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) syzkaller login: [ 51.134575][ T7228] IPVS: ftp: loaded support on port[0] = 21 14:40:58 executing program 1: setsockopt(0xffffffffffffffff, 0xfffffc00, 0x0, &(0x7f0000000000)="a9cf1466c4bfeea2c7e8613f90621940cefa815cfae6c360d4e869463637920165006b3b02cc073e7d80079820c787ec4cdb75a8efd833e7272c5d518b409558d407e42e", 0x44) dup(0xffffffffffffffff) pipe2$9p(0x0, 0x0) r0 = dup(0xffffffffffffffff) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000002c0)) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x9, 0x2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x6000) shmctl$SHM_INFO(0x0, 0xe, 0x0) close(r2) [ 51.236244][ T7228] chnl_net:caif_netlink_parms(): no params data found [ 51.311707][ T7228] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.319152][ T7228] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.327600][ T7228] device bridge_slave_0 entered promiscuous mode [ 51.352749][ T7228] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.360029][ T7228] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.382387][ T7228] device bridge_slave_1 entered promiscuous mode [ 51.403937][ T7228] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.415384][ T7228] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.441395][ T7228] team0: Port device team_slave_0 added [ 51.446584][ T7231] IPVS: ftp: loaded support on port[0] = 21 [ 51.449675][ T7228] team0: Port device team_slave_1 added 14:40:59 executing program 2: syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r6, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r6, 0x2}, &(0x7f0000000200)=0x8) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7400, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x5}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)='vxcan1\x00', 0x3, 0x243, 0x4}) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) sendmmsg(r5, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) [ 51.546188][ T7228] device hsr_slave_0 entered promiscuous mode [ 51.601840][ T7228] device hsr_slave_1 entered promiscuous mode [ 51.734738][ T7228] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.741970][ T7228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.749304][ T7228] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.756401][ T7228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.840233][ T7233] IPVS: ftp: loaded support on port[0] = 21 14:40:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x200, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @rand_addr="7e38fa0c8e6f513c69c7a2ea529bcef4"}}}, 0x108) connect$inet6(r1, &(0x7f0000000280), 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ace005dc81a74cfb49e35d00"/123], 0xb8}}, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 51.886299][ T7228] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.939122][ T7228] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.971218][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.991722][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.012837][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.034256][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 52.066723][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.092836][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.099937][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.155994][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.165113][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.172228][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.203226][ T7231] chnl_net:caif_netlink_parms(): no params data found [ 52.225684][ T7238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.246192][ T7239] IPVS: ftp: loaded support on port[0] = 21 14:40:59 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') read$FUSE(r1, &(0x7f0000000140), 0x1000) sendfile(r0, r1, 0x0, 0x80000003) [ 52.259390][ T7238] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.270978][ T7238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.280482][ T7238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.291770][ T7238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.300729][ T7238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.319966][ T7228] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.346096][ T7228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.387001][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.398165][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.455239][ T7228] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.523617][ T7231] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.531126][ T7231] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.552574][ T7231] device bridge_slave_0 entered promiscuous mode [ 52.564214][ T7231] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.571292][ T7231] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.602469][ T7231] device bridge_slave_1 entered promiscuous mode [ 52.647382][ T7233] chnl_net:caif_netlink_parms(): no params data found [ 52.682641][ T7245] IPVS: ftp: loaded support on port[0] = 21 [ 52.693261][ T7231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:41:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x34, 0x66, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4, 0xe}}}]}, 0x34}}, 0x0) [ 52.734199][ T7231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.794694][ T7231] team0: Port device team_slave_0 added [ 52.820283][ T7231] team0: Port device team_slave_1 added [ 52.853160][ T7233] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.860342][ T7233] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.884485][ T7233] device bridge_slave_0 entered promiscuous mode [ 52.894520][ T7233] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.901826][ T7233] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.910118][ T7233] device bridge_slave_1 entered promiscuous mode [ 52.933873][ T7251] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 14:41:00 executing program 0: r0 = socket$kcm(0x10, 0x100000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 53.024810][ T7231] device hsr_slave_0 entered promiscuous mode [ 53.061907][ T7231] device hsr_slave_1 entered promiscuous mode [ 53.101493][ T7231] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.111658][ T7233] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.123457][ T7233] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.156227][ T7256] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 53.173946][ T7231] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.181575][ T7231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.188979][ T7231] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.196188][ T7231] bridge0: port 1(bridge_slave_0) entered forwarding state 14:41:00 executing program 0: r0 = socket$kcm(0x10, 0x100000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 53.213882][ T7233] team0: Port device team_slave_0 added [ 53.229923][ T7239] chnl_net:caif_netlink_parms(): no params data found [ 53.256859][ T7233] team0: Port device team_slave_1 added [ 53.264541][ T7253] IPVS: ftp: loaded support on port[0] = 21 [ 53.364876][ T7233] device hsr_slave_0 entered promiscuous mode [ 53.412089][ T7233] device hsr_slave_1 entered promiscuous mode [ 53.451494][ T7233] debugfs: Directory 'hsr0' with parent '/' already present! 14:41:01 executing program 0: r0 = socket$kcm(0x10, 0x100000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 53.463148][ T7259] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 53.474861][ T7238] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.483050][ T7238] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.548555][ T7239] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.558770][ T7239] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.581503][ T7239] device bridge_slave_0 entered promiscuous mode [ 53.591646][ T7239] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.598882][ T7239] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.608125][ T7239] device bridge_slave_1 entered promiscuous mode [ 53.637744][ T7263] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 53.670919][ T7239] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.695536][ T7245] chnl_net:caif_netlink_parms(): no params data found 14:41:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x100) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) [ 53.721674][ T7239] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.759472][ T7233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.795422][ T7231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.810844][ T7233] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.823810][ T7239] team0: Port device team_slave_0 added [ 53.844797][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.853221][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.868786][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 53.868834][ T7231] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.868886][ T26] audit: type=1804 audit(1571323261.375:31): pid=7267 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir746227409/syzkaller.0pWaHT/4/bus" dev="sda1" ino=16521 res=1 [ 53.882863][ T7239] team0: Port device team_slave_1 added [ 53.915810][ C1] hrtimer: interrupt took 44741 ns [ 53.926757][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.939344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.948418][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.962441][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.971148][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.978272][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.992379][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.006023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.015384][ T7228] ================================================================== [ 54.023510][ T7228] BUG: KCSAN: data-race in do_nanosleep / mm_update_next_owner [ 54.031057][ T7228] [ 54.033500][ T7228] read to 0xffff888121c310a4 of 4 bytes by task 7265 on cpu 1: [ 54.041087][ T7228] mm_update_next_owner+0x29f/0x460 [ 54.046319][ T7228] do_exit+0x4c1/0x18f0 [ 54.050477][ T7228] do_group_exit+0xb4/0x1c0 [ 54.054963][ T7228] __x64_sys_exit_group+0x2e/0x30 [ 54.060035][ T7228] do_syscall_64+0xcc/0x370 [ 54.064543][ T7228] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 54.070581][ T7228] [ 54.072902][ T7228] write to 0xffff888121c310a4 of 4 bytes by task 7228 on cpu 0: [ 54.080849][ T7228] do_nanosleep+0x14d/0x320 [ 54.085394][ T7228] hrtimer_nanosleep+0x191/0x320 [ 54.090894][ T7228] __x64_sys_nanosleep+0x106/0x150 [ 54.096031][ T7228] do_syscall_64+0xcc/0x370 [ 54.100526][ T7228] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 54.106402][ T7228] [ 54.108991][ T7228] Reported by Kernel Concurrency Sanitizer on: [ 54.115145][ T7228] CPU: 0 PID: 7228 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 54.122941][ T7228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.132996][ T7228] ================================================================== [ 54.141076][ T7228] Kernel panic - not syncing: panic_on_warn set ... [ 54.147906][ T7228] CPU: 0 PID: 7228 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 54.155697][ T7228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.165890][ T7228] Call Trace: [ 54.169344][ T7228] dump_stack+0xf5/0x159 [ 54.173586][ T7228] panic+0x210/0x640 [ 54.177467][ T7228] ? vprintk_func+0x8d/0x140 [ 54.182057][ T7228] kcsan_report.cold+0xc/0x10 [ 54.186899][ T7228] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 54.192516][ T7228] __tsan_write4+0x32/0x40 [ 54.196927][ T7228] do_nanosleep+0x14d/0x320 [ 54.201438][ T7228] hrtimer_nanosleep+0x191/0x320 [ 54.206841][ T7228] ? hrtimer_active+0x1a0/0x1a0 [ 54.211784][ T7228] __x64_sys_nanosleep+0x106/0x150 [ 54.216894][ T7228] do_syscall_64+0xcc/0x370 [ 54.221393][ T7228] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 54.227299][ T7228] RIP: 0033:0x457f00 [ 54.231615][ T7228] Code: c0 5b 5d c3 66 0f 1f 44 00 00 8b 04 24 48 83 c4 18 5b 5d c3 66 0f 1f 44 00 00 83 3d 51 e8 61 00 00 75 14 b8 23 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 24 d3 fb ff c3 48 83 ec 08 e8 ea 46 00 00 [ 54.251216][ T7228] RSP: 002b:00007ffef3b5ec38 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 [ 54.259629][ T7228] RAX: ffffffffffffffda RBX: 000000000000d2d6 RCX: 0000000000457f00 [ 54.267615][ T7228] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffef3b5ec40 [ 54.275596][ T7228] RBP: 000000000000000a R08: 0000000000000001 R09: 0000000000c02940 [ 54.283561][ T7228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 54.291540][ T7228] R13: 00007ffef3b5ec90 R14: 000000000000d1fb R15: 00007ffef3b5eca0 [ 54.301434][ T7228] Kernel Offset: disabled [ 54.305878][ T7228] Rebooting in 86400 seconds..