Warning: Permanently added '10.128.0.28' (ECDSA) to the list of known hosts. 2019/11/30 01:57:42 fuzzer started 2019/11/30 01:57:43 dialing manager at 10.128.0.105:44645 2019/11/30 01:57:44 syscalls: 2592 2019/11/30 01:57:44 code coverage: enabled 2019/11/30 01:57:44 comparison tracing: enabled 2019/11/30 01:57:44 extra coverage: extra coverage is not supported by the kernel 2019/11/30 01:57:44 setuid sandbox: enabled 2019/11/30 01:57:44 namespace sandbox: enabled 2019/11/30 01:57:44 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 01:57:44 fault injection: enabled 2019/11/30 01:57:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 01:57:44 net packet injection: enabled 2019/11/30 01:57:44 net device setup: enabled 2019/11/30 01:57:44 concurrency sanitizer: enabled 2019/11/30 01:57:44 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/30 01:57:48 adding functions to KCSAN blacklist: 'add_timer' 'tick_do_update_jiffies64' 'ext4_free_inode' '__ext4_new_inode' 'mod_timer' '__hrtimer_run_queues' 'find_get_pages_range_tag' 'mm_update_next_owner' 'taskstats_exit' 'wbt_issue' 'tick_nohz_idle_stop_tick' 'blk_mq_get_request' 'ep_poll' 'pipe_poll' 'tick_sched_do_timer' 'blk_mq_dispatch_rq_list' 'find_next_bit' 'xas_clear_mark' 'lruvec_lru_size' 'filemap_map_pages' 'vm_area_dup' 'ext4_mb_find_by_goal' 'generic_write_end' 'tcp_add_backlog' 'rcu_gp_fqs_check_wake' 'run_timer_softirq' 'dd_has_work' 'ext4_nonda_switch' 'tomoyo_supervisor' '__splice_from_pipe' 01:58:12 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) 01:58:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f00000000c0)={@local, @empty}, &(0x7f0000000100)=0x8) fcntl$getflags(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1140088}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="100000001400000327bd7000fbdbdf25ae7c01f46254528526d6a3e696b1e679bc902a96cb388f2e14118d50f37bf14532dd9e7d0023b053a55f9cee6b3193655de36f2f6393973cd0000e5af1593a22694c3ebd2ab2929ffaff92f3fa106807305eea994e2a12160c715dd74c6462e5593b39b1c029324937384a0b7dea9213e40038f75a4d186ce35ce49ea5830f291d166aedfed18cde5d45c3ec26d2bb69ad373b0600cf7fcf7543e2fb0f6119506a270baa7cf6d37b8def5ecb2c18c5f21d47e893a677f43dee47916b64"], 0x10}, 0x1, 0x0, 0x0, 0x810}, 0x804) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x12, r4, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8002, 0x0) write$sndseq(r5, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x0) r7 = getegid() fcntl$getownex(r6, 0x10, &(0x7f0000000a80)={0x0, 0x0}) lstat(0x0, &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) lstat(0x0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r10, 0x0, r11) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1c000000000000000100000002000000843d6447c102a2778e10dacfae43f25714e25a5d59d9225642c2b4cf218bec84fe6e42b246b171c332a6796876a2ac753cb6af14c8b8fa803a5c5c457f2387ec4ba0f248f8011b28c6fe13ec", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="000000001c00", @ANYRES32=0x0, @ANYRES32=r9, @ANYRES32=r11], 0x7a, 0x4}, 0x6010) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0x0) geteuid() openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x80401, 0x0) r12 = geteuid() r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r13, 0x4, 0x0) r14 = getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a80)={0x0, 0x0}) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000b80)='./file0\x00', 0x0) r17 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) lstat(0x0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r17, 0x0, r18) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000700)="8e01364aa70818cbf626a37fcfa2270baff3d5e2cb6b0bada6c69f072980e53f814ae0e21a482618037c48c5912a9f3f77", 0x31}], 0x4, &(0x7f0000000c40)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32=r14, @ANYBLOB, @ANYBLOB, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="000000001c00", @ANYRES32=0x0, @ANYRES32=r18], 0x22}, 0x6010) getgroups(0x1, &(0x7f00000000c0)=[0x0]) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000140)={0x78, 0xfffffffffffffffe, 0x0, {0x5, 0x1, 0x0, {0x0, 0x3, 0x833, 0xfff, 0x0, 0xffff, 0xae3d, 0x620c, 0x80000000, 0x9, 0x0, r12, r14, 0x0, 0xd2f}}}, 0x78) r19 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x0, 0x0) write$sndseq(r19, &(0x7f0000000000)=[{0x5b93, 0x0, 0xffffffffffffff80, 0x0, @tick, {}, {}, @connect}], 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000006c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) r20 = geteuid() r21 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r21, 0x4, 0x0) r22 = getegid() fcntl$getownex(r21, 0x10, &(0x7f0000000a80)) lstat(0x0, 0x0) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) r23 = open(0x0, 0x141042, 0x0) lstat(0x0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r23, 0x0, r24) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) getgroups(0x1, &(0x7f00000000c0)=[r22]) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000140)={0x78, 0xfffffffffffffffe, 0x0, {0x5, 0x0, 0x0, {0x5, 0x3, 0x833, 0xfff, 0x4b9b, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, r20}}}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a80)) lstat(0x0, &(0x7f0000000b00)) lstat(0x0, &(0x7f0000000bc0)) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) lstat(0x0, &(0x7f00000017c0)) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) getgid() r25 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r26 = geteuid() r27 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r27, 0x4, 0x0) r28 = getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a80)={0x0, 0x0}) lstat(0x0, &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) r30 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) lstat(0x0, 0x0) fchown(r30, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32=r29, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x20}, 0x6010) getgroups(0x1, &(0x7f00000000c0)=[r28]) write$FUSE_ATTR(r25, &(0x7f0000000140)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x3, 0x0, 0x0, 0x0, 0xffff, 0xae3d, 0x620c, 0x80000000, 0x9, 0x0, r26, 0x0, 0x0, 0xd2f}}}, 0x78) r31 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x80401, 0x0) r32 = geteuid() r33 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getegid() fcntl$getownex(r33, 0x10, 0x0) lstat(0x0, &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) r34 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) lstat(0x0, &(0x7f00000017c0)) fchown(r34, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0}, 0x6010) getgroups(0x0, 0x0) write$FUSE_ATTR(r31, &(0x7f0000000140)={0x78, 0x0, 0x0, {0x5, 0x0, 0x0, {0x5, 0x0, 0x0, 0x0, 0x4b9b, 0xffff, 0xae3d, 0x0, 0x0, 0x9, 0x0, r32, 0x0, 0x8001, 0xd2f}}}, 0x78) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) geteuid() r35 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r36 = getegid() fcntl$getownex(r35, 0x10, 0x0) lstat(0x0, &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) lstat(0x0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYBLOB="000000001c00120000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r37, @ANYBLOB], 0x21}, 0x0) getgroups(0x0, &(0x7f00000000c0)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000140)={0x78, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0x0, {0x0, 0x3, 0x0, 0x0, 0x4b9b, 0x0, 0xae3d, 0x620c, 0x80000000, 0x9, 0x0, 0x0, r36}}}, 0x78) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) r38 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r38, 0x4, 0x0) getegid() fcntl$getownex(r38, 0x10, 0x0) lstat(0x0, 0x0) lstat(0x0, &(0x7f0000000bc0)) r39 = open(0x0, 0x141042, 0x0) lstat(0x0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r39, 0x0, r40) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getegid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() lstat(0x0, &(0x7f0000000bc0)) open(0x0, 0x0, 0x0) syzkaller login: [ 84.654201][ T7580] IPVS: ftp: loaded support on port[0] = 21 [ 84.734189][ T7580] chnl_net:caif_netlink_parms(): no params data found [ 84.764375][ T7580] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.786953][ T7580] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.794912][ T7580] device bridge_slave_0 entered promiscuous mode [ 84.817996][ T7580] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.825105][ T7580] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.832993][ T7580] device bridge_slave_1 entered promiscuous mode [ 84.878545][ T7580] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.898373][ T7580] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.918238][ T7580] team0: Port device team_slave_0 added [ 84.921504][ T7583] IPVS: ftp: loaded support on port[0] = 21 [ 84.924857][ T7580] team0: Port device team_slave_1 added 01:58:13 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 84.999537][ T7580] device hsr_slave_0 entered promiscuous mode [ 85.067357][ T7580] device hsr_slave_1 entered promiscuous mode [ 85.184617][ T7585] IPVS: ftp: loaded support on port[0] = 21 [ 85.212161][ T7580] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.219298][ T7580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.226559][ T7580] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.233635][ T7580] bridge0: port 1(bridge_slave_0) entered forwarding state 01:58:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x2c) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) [ 85.570300][ T7583] chnl_net:caif_netlink_parms(): no params data found [ 85.652999][ T7580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.687961][ T7585] chnl_net:caif_netlink_parms(): no params data found [ 85.713015][ T7580] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.741098][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.757878][ T3515] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.797308][ T3515] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.829705][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 85.877089][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.907570][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.938499][ T3515] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.945572][ T3515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.977530][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.007341][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.038532][ T3515] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.045794][ T3515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.077406][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.107740][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.139338][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.169464][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.205459][ T7583] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.218289][ T7583] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.256966][ T7583] device bridge_slave_0 entered promiscuous mode [ 86.283381][ T7580] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 01:58:14 executing program 4: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='asymmetric\x00\xddd\xadR\xcd\xf0\x9ac=,\x814\xe9\xd1*c\f:\xe2p\x96\x0e<\x80\aY\xed@\x8f/\x0f\xedDVQ\xac\t\x8d\xbf\x91\xa2b]IG\xc1\x87r\xb0\xd69\xb1\xbdar\x83k\x0f\xa1Uj\xa0\xc6\x0e\xb3u\r\xaa\xad\xab\x7f4\f(\xea\xd2\xcc\a\x1f\x9a#\xa3#U\"\xa6\xf38\x80}\b\xdfE|\x12\xf5F\xd0F\xc45\x9b[\xa1D`I\xd4+\x1el\xb1k\x1c\xd9\x82\xa9B\xef\xbb\xf4\'%\xef\xb6\xfa\xcd\xd6O\x85B\xb5\xd4;\x93)\x8d\x85\xce]\x9d\xcb\xc3\xe5J\x16\x88\xd2!Rf+v2[\xef\x18\xc4\xacG9\x13\xcaa6\xaf4CH9\xf0\x99i\x05\xe0uFR3\a\x04\x9e$T\x80U\xcf\x94\xcf\x14^\xfc\xb7', 0x0) request_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='devpts\x00', 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='trusted\x00', 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0x0) creat(&(0x7f0000000940)='./file0\x00', 0x9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f0000000340)='/selinux/poli\xec\x13\rA\x9e\xd7j\x8e\xcbo\xccb\xf0@^\x86t$\x87\x10]\xf3\x9d\x81\xda\x03R\x9b{\xf4\t\xaa\x83\xfa/\xfb{\xc5{\x01~\xe0,hhw\xdd\xd0\x83\xc7\x13\xb9\xf3G\x00'/80) r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2Y\x00\x00\x00_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000440)='./bus\x00', 0x0) fallocate(r6, 0x0, 0x1, 0x2000402) fallocate(r5, 0x0, 0x0, 0x110001) r7 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x20800, 0x0) bind$nfc_llcp(r7, &(0x7f00000002c0)={0x27, 0x0, 0x2, 0x4, 0x6, 0x3, "227feeb5c44f123d00ed3b6f316fad55f62cfa99b6e146d7c520eddb7d89be91b3bf12d54bd60027fd815c3ba3620268bd2bdd221bb6f093e5b575edf76cdb", 0x28}, 0x60) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0x0, r6}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r8 = open(&(0x7f0000000340)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(r8, &(0x7f0000000000)=ANY=[], 0x323) r9 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8fff) [ 86.316863][ T7580] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.362975][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.381612][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.417550][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.448357][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 86.477318][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 86.518038][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 86.557278][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 86.589102][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 86.593236][ T7614] IPVS: ftp: loaded support on port[0] = 21 [ 86.609043][ T7583] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.616100][ T7583] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.637712][ T7583] device bridge_slave_1 entered promiscuous mode [ 86.664787][ T7583] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.690481][ T7583] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.708667][ T7585] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.715812][ T7585] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.724200][ T7585] device bridge_slave_0 entered promiscuous mode [ 86.751351][ T7624] IPVS: ftp: loaded support on port[0] = 21 [ 86.761535][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 86.770883][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 86.791081][ T7580] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.803379][ T7585] bridge0: port 2(bridge_slave_1) entered blocking state 01:58:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) getgid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(0x0, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@can, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x80000) [ 86.811464][ T7585] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.827279][ T7585] device bridge_slave_1 entered promiscuous mode [ 86.847540][ T7583] team0: Port device team_slave_0 added [ 86.879446][ T7583] team0: Port device team_slave_1 added [ 86.904152][ T7585] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.957734][ T7585] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.009110][ T7583] device hsr_slave_0 entered promiscuous mode [ 87.047466][ T7583] device hsr_slave_1 entered promiscuous mode [ 87.107058][ T7583] debugfs: Directory 'hsr0' with parent '/' already present! [ 87.144347][ T7633] IPVS: ftp: loaded support on port[0] = 21 [ 87.160641][ T7614] chnl_net:caif_netlink_parms(): no params data found [ 87.216715][ T7585] team0: Port device team_slave_0 added 01:58:15 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) [ 87.296744][ T7585] team0: Port device team_slave_1 added [ 87.308644][ T7614] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.315784][ T7614] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.333504][ T7614] device bridge_slave_0 entered promiscuous mode [ 87.412268][ T7614] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.436969][ T7614] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.487163][ T7614] device bridge_slave_1 entered promiscuous mode 01:58:15 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) [ 87.551454][ T7585] device hsr_slave_0 entered promiscuous mode [ 87.617245][ T7585] device hsr_slave_1 entered promiscuous mode [ 87.656998][ T7585] debugfs: Directory 'hsr0' with parent '/' already present! [ 87.674784][ T7614] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.708375][ T7614] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:58:15 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) [ 87.792388][ T7614] team0: Port device team_slave_0 added [ 87.887970][ T7624] chnl_net:caif_netlink_parms(): no params data found [ 87.910843][ T7614] team0: Port device team_slave_1 added [ 87.965670][ T7583] 8021q: adding VLAN 0 to HW filter on device bond0 01:58:16 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) [ 88.152112][ T7614] device hsr_slave_0 entered promiscuous mode [ 88.234664][ T7614] device hsr_slave_1 entered promiscuous mode [ 88.277113][ T7614] debugfs: Directory 'hsr0' with parent '/' already present! [ 88.299716][ T7633] chnl_net:caif_netlink_parms(): no params data found [ 88.310716][ T7678] ================================================================== [ 88.318845][ T7678] BUG: KCSAN: data-race in generic_permission / task_dump_owner [ 88.326460][ T7678] [ 88.328790][ T7678] read to 0xffff8881288a7d6c of 4 bytes by task 7675 on cpu 1: [ 88.336337][ T7678] generic_permission+0x65/0x3d0 [ 88.341280][ T7678] proc_pid_permission+0xea/0x1c0 [ 88.346311][ T7678] inode_permission+0x241/0x3c0 [ 88.351165][ T7678] link_path_walk.part.0+0x622/0xa90 [ 88.356460][ T7678] path_openat+0x14f/0x36e0 [ 88.360959][ T7678] do_filp_open+0x11e/0x1b0 [ 88.365487][ T7678] do_sys_open+0x3b3/0x4f0 [ 88.369904][ T7678] __x64_sys_open+0x55/0x70 [ 88.374410][ T7678] do_syscall_64+0xcc/0x370 [ 88.378912][ T7678] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 88.384789][ T7678] [ 88.387116][ T7678] write to 0xffff8881288a7d6c of 4 bytes by task 7678 on cpu 0: [ 88.394754][ T7678] task_dump_owner+0x237/0x260 [ 88.399516][ T7678] pid_update_inode+0x3c/0x70 [ 88.404201][ T7678] pid_revalidate+0x91/0xd0 [ 88.408709][ T7678] lookup_fast+0x6f2/0x700 [ 88.410494][ T7633] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.413126][ T7678] walk_component+0x6d/0xe70 [ 88.413149][ T7678] link_path_walk.part.0+0x5d3/0xa90 [ 88.430087][ T7678] path_openat+0x14f/0x36e0 [ 88.434592][ T7678] do_filp_open+0x11e/0x1b0 [ 88.439100][ T7678] do_sys_open+0x3b3/0x4f0 [ 88.443520][ T7678] __x64_sys_open+0x55/0x70 [ 88.448021][ T7678] do_syscall_64+0xcc/0x370 [ 88.451824][ T7633] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.452527][ T7678] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 88.465391][ T7678] [ 88.467710][ T7678] Reported by Kernel Concurrency Sanitizer on: [ 88.473861][ T7678] CPU: 0 PID: 7678 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 88.481068][ T7678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.484601][ T7633] device bridge_slave_0 entered promiscuous mode [ 88.491119][ T7678] ================================================================== [ 88.491128][ T7678] Kernel panic - not syncing: panic_on_warn set ... [ 88.491146][ T7678] CPU: 0 PID: 7678 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 88.491153][ T7678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.491167][ T7678] Call Trace: [ 88.532687][ T7678] dump_stack+0x11d/0x181 [ 88.537027][ T7678] panic+0x210/0x640 [ 88.541021][ T7678] ? vprintk_func+0x8d/0x140 [ 88.545084][ T7633] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.545618][ T7678] kcsan_report.cold+0xc/0xd [ 88.545644][ T7678] kcsan_setup_watchpoint+0x3fe/0x460 [ 88.563031][ T7678] __tsan_unaligned_write4+0xc4/0x100 [ 88.568408][ T7678] task_dump_owner+0x237/0x260 [ 88.573204][ T7678] ? __rcu_read_unlock+0x66/0x3c0 [ 88.578248][ T7678] pid_update_inode+0x3c/0x70 [ 88.580037][ T7633] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.582929][ T7678] pid_revalidate+0x91/0xd0 [ 88.582954][ T7678] lookup_fast+0x6f2/0x700 [ 88.598870][ T7678] walk_component+0x6d/0xe70 [ 88.603477][ T7678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.609727][ T7678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.615966][ T7678] ? security_inode_permission+0xa5/0xc0 [ 88.621393][ T7633] device bridge_slave_1 entered promiscuous mode [ 88.621617][ T7678] ? inode_permission+0xa0/0x3c0 [ 88.632851][ T7678] link_path_walk.part.0+0x5d3/0xa90 [ 88.638156][ T7678] path_openat+0x14f/0x36e0 [ 88.642675][ T7678] ? __read_once_size.constprop.0+0x12/0x20 [ 88.648583][ T7678] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 88.654830][ T7678] ? __virt_addr_valid+0x126/0x190 [ 88.659949][ T7678] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 88.666191][ T7678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.672491][ T7678] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 88.678388][ T7678] ? __read_once_size+0x41/0xe0 [ 88.683248][ T7678] do_filp_open+0x11e/0x1b0 [ 88.687802][ T7678] ? __alloc_fd+0x2ef/0x3b0 [ 88.692321][ T7678] do_sys_open+0x3b3/0x4f0 [ 88.696750][ T7678] __x64_sys_open+0x55/0x70 [ 88.699613][ T7633] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.701343][ T7678] do_syscall_64+0xcc/0x370 [ 88.701365][ T7678] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 88.701385][ T7678] RIP: 0033:0x7f30f3744120 [ 88.725216][ T7678] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 88.744822][ T7678] RSP: 002b:00007ffc5ef64108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 88.750397][ T7633] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.753231][ T7678] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f30f3744120 [ 88.753249][ T7678] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f30f3c12d00 [ 88.778199][ T7678] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f30f3a0c57b [ 88.786169][ T7678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30f3c11d00 [ 88.794142][ T7678] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 88.803753][ T7678] Kernel Offset: disabled [ 88.808113][ T7678] Rebooting in 86400 seconds..