[info] Using makefile-style concurrent boot in runlevel 2. [ 42.142087][ T26] audit: type=1800 audit(1575663442.541:21): pid=7409 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.175104][ T26] audit: type=1800 audit(1575663442.551:22): pid=7409 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.38' (ECDSA) to the list of known hosts. 2019/12/06 20:17:34 fuzzer started 2019/12/06 20:17:36 dialing manager at 10.128.0.105:42203 2019/12/06 20:17:54 syscalls: 2684 2019/12/06 20:17:54 code coverage: enabled 2019/12/06 20:17:54 comparison tracing: enabled 2019/12/06 20:17:54 extra coverage: extra coverage is not supported by the kernel 2019/12/06 20:17:54 setuid sandbox: enabled 2019/12/06 20:17:54 namespace sandbox: enabled 2019/12/06 20:17:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/06 20:17:54 fault injection: enabled 2019/12/06 20:17:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/06 20:17:54 net packet injection: enabled 2019/12/06 20:17:54 net device setup: enabled 2019/12/06 20:17:54 concurrency sanitizer: enabled 2019/12/06 20:17:54 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 80.611268][ T7575] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/06 20:18:02 adding functions to KCSAN blacklist: 'pid_update_inode' 'timer_clear_idle' '__delete_from_page_cache' 'ep_poll' 'd_lru_del' 'echo_char' '__snd_rawmidi_transmit_ack' 'ext4_free_inode' 'list_lru_count_one' 'find_next_bit' 'ktime_get_real_seconds' 'pipe_poll' 'blk_mq_free_request' '__mark_inode_dirty' 'pcpu_alloc' 'snd_seq_check_queue' 'ext4_has_free_clusters' 'tcp_add_backlog' 'vm_area_dup' 'tick_sched_do_timer' 'generic_write_end' 'find_alive_thread' '__hrtimer_run_queues' 'generic_fillattr' 'add_timer' 'wbt_done' 'tick_nohz_idle_stop_tick' 'atime_needs_update' 'attach_to_pi_owner' 'generic_file_read_iter' 'blk_mq_dispatch_rq_list' 'xas_find_marked' 'do_nanosleep' 'tick_do_update_jiffies64' 'rcu_gp_fqs_check_wake' 'ext4_nonda_switch' 'bio_endio' 'lruvec_lru_size' 'blk_mq_get_request' 'pipe_wait' 'run_timer_softirq' 'rcu_gp_fqs_loop' 'ext4_mb_good_group' 'poll_schedule_timeout' 'has_bh_in_lru' 'find_get_pages_range_tag' 'mod_timer' '__find_get_block' 'blk_mq_sched_dispatch_requests' 'n_tty_receive_buf_common' 'taskstats_exit' 'handle_userfault' 'common_perm_cond' 'dd_has_work' '__writeback_single_inode' '__ext4_new_inode' 'do_syslog' 'ext4_free_inodes_count' 'tomoyo_supervisor' 20:20:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB], 0x2}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001680)='team\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r5}]]}}}]}, 0x38}}, 0x0) 20:20:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x32, 0x20000001}, 0x14}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 254.670656][ T7579] IPVS: ftp: loaded support on port[0] = 21 [ 254.795204][ T7579] chnl_net:caif_netlink_parms(): no params data found [ 254.825909][ T7579] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.833107][ T7579] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.840872][ T7579] device bridge_slave_0 entered promiscuous mode [ 254.848789][ T7579] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.852651][ T7582] IPVS: ftp: loaded support on port[0] = 21 [ 254.856356][ T7579] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.870070][ T7579] device bridge_slave_1 entered promiscuous mode 20:20:55 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x2d, 0x4002) stat(0x0, &(0x7f0000000b00)) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x2400c004) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000880)={0x0, 0x9, 0x8000, 0x6, 0x1}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=[0x0], 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) pipe(&(0x7f0000000200)) clock_nanosleep(0x6, 0x1, &(0x7f0000000c40), 0x0) [ 254.890928][ T7579] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.905217][ T7579] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.935175][ T7579] team0: Port device team_slave_0 added [ 254.956258][ T7579] team0: Port device team_slave_1 added [ 255.046340][ T7579] device hsr_slave_0 entered promiscuous mode [ 255.083681][ T7579] device hsr_slave_1 entered promiscuous mode 20:20:55 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x4, @local, 'team0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x4000000000001b2, 0x0) [ 255.146458][ T7586] IPVS: ftp: loaded support on port[0] = 21 [ 255.164798][ T7582] chnl_net:caif_netlink_parms(): no params data found [ 255.256374][ T7579] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.263487][ T7579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.270775][ T7579] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.277852][ T7579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.411627][ T7582] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.419150][ T7582] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.454263][ T7582] device bridge_slave_0 entered promiscuous mode [ 255.494759][ T7582] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.501907][ T7582] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.554092][ T7582] device bridge_slave_1 entered promiscuous mode [ 255.670575][ T7586] chnl_net:caif_netlink_parms(): no params data found [ 255.716643][ T7582] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 255.758724][ T7614] IPVS: ftp: loaded support on port[0] = 21 [ 255.774515][ T7582] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 255.810988][ T7579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.838629][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.873820][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.903919][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 255.959326][ T7579] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.002001][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.011164][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:20:56 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x1, 0x0) writev(r0, &(0x7f0000001300)=[{&(0x7f00000001c0)="a5bd2a8421ccad6211c5fe3415e464cbbe6615dd0878e4c07c4570ada43d67156270583f54111fd6d4853a0a00413f5c7b16d764c468627cff5b5f54a48a0928", 0x40}], 0x1) [ 256.046180][ T7582] team0: Port device team_slave_0 added [ 256.075606][ T7586] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.082698][ T7586] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.115965][ T7586] device bridge_slave_0 entered promiscuous mode [ 256.143922][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.152982][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.183862][ T2867] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.190931][ T2867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.243883][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.252464][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.283929][ T2867] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.291007][ T2867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.355584][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.376271][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.425361][ T7582] team0: Port device team_slave_1 added [ 256.438150][ T7586] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.449435][ T7586] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.483455][ T7586] device bridge_slave_1 entered promiscuous mode [ 256.510033][ T7579] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 256.543457][ T7579] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 256.586696][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.604019][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.630176][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.646428][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.664197][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.684821][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.695122][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.703804][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 20:20:57 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d062adddc27e6805fffff7000000", @ANYRES32, @ANYBLOB="00000000ffffff"], 0x3}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4404000024000705000000000000000000005a4c", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x1d8) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 256.755830][ T7582] device hsr_slave_0 entered promiscuous mode [ 256.774209][ T7582] device hsr_slave_1 entered promiscuous mode [ 256.853457][ T7582] debugfs: Directory 'hsr0' with parent '/' already present! [ 256.869112][ T7619] IPVS: ftp: loaded support on port[0] = 21 [ 256.884661][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.892931][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 256.901927][ T7586] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.915424][ T7586] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.944216][ T7579] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 256.954184][ T7629] IPVS: ftp: loaded support on port[0] = 21 [ 256.979892][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 256.994291][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 257.056770][ T7614] chnl_net:caif_netlink_parms(): no params data found [ 257.099291][ T7586] team0: Port device team_slave_0 added [ 257.159073][ T7586] team0: Port device team_slave_1 added [ 257.320544][ T7582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.343963][ T7614] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.351052][ T7614] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.359210][ T7614] device bridge_slave_0 entered promiscuous mode [ 257.405813][ T7586] device hsr_slave_0 entered promiscuous mode [ 257.427072][ T7586] device hsr_slave_1 entered promiscuous mode [ 257.493429][ T7586] debugfs: Directory 'hsr0' with parent '/' already present! [ 257.535783][ T7614] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.547216][ T7614] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.572943][ T7614] device bridge_slave_1 entered promiscuous mode [ 257.667850][ T7582] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.719281][ T7619] chnl_net:caif_netlink_parms(): no params data found [ 257.734995][ T7583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.750375][ T7583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.848828][ T7614] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 257.889758][ T7588] ================================================================== [ 257.897895][ T7588] BUG: KCSAN: data-race in copy_process / task_dump_owner [ 257.904990][ T7588] [ 257.907322][ T7588] read to 0xffff8880b2d55024 of 4 bytes by task 7638 on cpu 1: [ 257.914888][ T7588] task_dump_owner+0x43/0x260 [ 257.919574][ T7588] pid_update_inode+0x3c/0x70 [ 257.924246][ T7588] pid_revalidate+0x91/0xd0 [ 257.928751][ T7588] lookup_fast+0x6f2/0x700 [ 257.933159][ T7588] walk_component+0x6d/0xe70 [ 257.937749][ T7588] path_lookupat.isra.0+0x13a/0x5a0 [ 257.942944][ T7588] filename_lookup+0x145/0x2b0 [ 257.947720][ T7588] user_path_at_empty+0x4c/0x70 [ 257.952571][ T7588] vfs_statx+0xd9/0x190 [ 257.955076][ T7614] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 257.956731][ T7588] __do_sys_newstat+0x51/0xb0 [ 257.970473][ T7588] __x64_sys_newstat+0x3a/0x50 [ 257.975259][ T7588] do_syscall_64+0xcc/0x370 [ 257.979779][ T7588] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 257.985664][ T7588] [ 257.988022][ T7588] write to 0xffff8880b2d55024 of 4 bytes by task 7588 on cpu 0: [ 257.995668][ T7588] copy_process+0x916/0x3b50 [ 258.000260][ T7588] _do_fork+0xfe/0x6e0 [ 258.004329][ T7588] __x64_sys_clone+0x12b/0x160 [ 258.009098][ T7588] do_syscall_64+0xcc/0x370 [ 258.013605][ T7588] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 258.019479][ T7588] [ 258.021799][ T7588] Reported by Kernel Concurrency Sanitizer on: [ 258.027965][ T7588] CPU: 0 PID: 7588 Comm: udevd Not tainted 5.4.0-syzkaller #0 [ 258.035411][ T7588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.037481][ T7614] team0: Port device team_slave_0 added [ 258.045468][ T7588] ================================================================== [ 258.045476][ T7588] Kernel panic - not syncing: panic_on_warn set ... [ 258.045493][ T7588] CPU: 0 PID: 7588 Comm: udevd Not tainted 5.4.0-syzkaller #0 [ 258.045501][ T7588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.045505][ T7588] Call Trace: [ 258.045529][ T7588] dump_stack+0x11d/0x181 [ 258.045556][ T7588] panic+0x210/0x640 [ 258.094992][ T7588] ? vprintk_func+0x8d/0x140 [ 258.099599][ T7588] kcsan_report.cold+0xc/0xd [ 258.104204][ T7588] kcsan_setup_watchpoint+0x3fe/0x460 [ 258.104787][ T7614] team0: Port device team_slave_1 added [ 258.109599][ T7588] __tsan_unaligned_write4+0xc4/0x100 [ 258.120485][ T7588] copy_process+0x916/0x3b50 [ 258.125102][ T7588] ? __d_free_external+0x60/0x60 [ 258.130046][ T7588] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 258.136285][ T7588] ? debug_smp_processor_id+0x4c/0x172 [ 258.141761][ T7588] _do_fork+0xfe/0x6e0 [ 258.145838][ T7588] ? do_renameat2+0x447/0xa50 [ 258.150524][ T7588] __x64_sys_clone+0x12b/0x160 [ 258.155301][ T7588] do_syscall_64+0xcc/0x370 [ 258.159808][ T7588] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 258.165697][ T7588] RIP: 0033:0x7ff1dd351f46 [ 258.170121][ T7588] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 14 25 10 00 00 00 31 d2 49 81 c2 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 31 01 00 00 85 c0 41 89 c4 0f 85 3b 01 00 [ 258.189834][ T7588] RSP: 002b:00007ffc35b7dd60 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 258.198250][ T7588] RAX: ffffffffffffffda RBX: 00007ffc35b7dd60 RCX: 00007ff1dd351f46 [ 258.206239][ T7588] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 258.215335][ T7588] RBP: 00007ffc35b7ddc0 R08: 0000000000001da4 R09: 0000000000001da4 [ 258.225123][ T7588] R10: 00007ff1ddc6ea70 R11: 0000000000000246 R12: 0000000000000000 [ 258.233088][ T7588] R13: 00007ffc35b7dd80 R14: 0000000000000000 R15: 000000000175b100 [ 258.242617][ T7588] Kernel Offset: disabled [ 258.246958][ T7588] Rebooting in 86400 seconds..