[info] Using makefile-style concurrent boot in runlevel 2. [ 42.162927][ T26] audit: type=1800 audit(1575153227.120:21): pid=7413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.205771][ T26] audit: type=1800 audit(1575153227.130:22): pid=7413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.169' (ECDSA) to the list of known hosts. 2019/11/30 22:33:58 fuzzer started 2019/11/30 22:34:00 dialing manager at 10.128.0.105:36521 2019/11/30 22:34:05 syscalls: 2592 2019/11/30 22:34:05 code coverage: enabled 2019/11/30 22:34:05 comparison tracing: enabled 2019/11/30 22:34:05 extra coverage: extra coverage is not supported by the kernel 2019/11/30 22:34:05 setuid sandbox: enabled 2019/11/30 22:34:05 namespace sandbox: enabled 2019/11/30 22:34:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 22:34:05 fault injection: enabled 2019/11/30 22:34:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 22:34:05 net packet injection: enabled 2019/11/30 22:34:05 net device setup: enabled 2019/11/30 22:34:05 concurrency sanitizer: enabled 2019/11/30 22:34:05 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 67.538385][ T7583] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/30 22:34:13 adding functions to KCSAN blacklist: 'pfkey_is_alive' 'queue_access_lock' 'tomoyo_supervisor' '__rb_erase_color' 'snd_ctl_notify' 'blk_mq_dispatch_rq_list' 'wbt_issue' 'xas_clear_mark' 'check_lifetime' 'n_tty_receive_buf_common' 'pipe_poll' 'tcp_add_backlog' 'find_next_bit' 'ext4_has_free_clusters' 'rcu_gp_fqs_loop' 'generic_write_end' '__snd_rawmidi_transmit_ack' 'tomoyo_check_path_acl' 'blk_mq_sched_dispatch_requests' 'ext4_mark_iloc_dirty' 'do_nanosleep' 'tick_do_update_jiffies64' 'lruvec_lru_size' 'virtqueue_enable_cb_delayed' 'ext4_nonda_switch' 'run_timer_softirq' 'vm_area_dup' 'audit_log_start' 'tick_nohz_idle_stop_tick' '__ext4_new_inode' 'taskstats_exit' 'mod_timer' 'add_timer' 'list_lru_count_one' 'ep_poll' 'rcu_gp_fqs_check_wake' 'poll_schedule_timeout' '__hrtimer_run_queues' 'tick_sched_do_timer' 'ext4_mb_good_group' 'wbt_done' 'do_syslog' 'kauditd_thread' 22:34:51 executing program 0: socket$kcm(0x11, 0xa, 0x300) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="f05700b06700000000000001"], 0xf) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendfile(r1, r1, &(0x7f0000000140)=0x8800, 0x8800000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x2c) [ 106.510716][ T7585] IPVS: ftp: loaded support on port[0] = 21 22:34:51 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) r3 = dup3(r0, r1, 0x0) dup2(r3, r2) socket$inet6_tcp(0xa, 0x1, 0x0) [ 106.580648][ T7585] chnl_net:caif_netlink_parms(): no params data found [ 106.630636][ T7585] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.645117][ T7585] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.652990][ T7585] device bridge_slave_0 entered promiscuous mode [ 106.676105][ T7585] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.683225][ T7585] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.705592][ T7585] device bridge_slave_1 entered promiscuous mode [ 106.733053][ T7585] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 106.744119][ T7585] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 106.763240][ T7585] team0: Port device team_slave_0 added [ 106.766089][ T7588] IPVS: ftp: loaded support on port[0] = 21 [ 106.776746][ T7585] team0: Port device team_slave_1 added 22:34:51 executing program 2: r0 = timerfd_create(0x9, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_settime(r0, 0x1, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, 0x0) [ 106.866969][ T7585] device hsr_slave_0 entered promiscuous mode [ 106.905297][ T7585] device hsr_slave_1 entered promiscuous mode [ 106.994288][ T7590] IPVS: ftp: loaded support on port[0] = 21 [ 107.046724][ T7585] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.053813][ T7585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.061300][ T7585] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.068375][ T7585] bridge0: port 1(bridge_slave_0) entered forwarding state 22:34:52 executing program 3: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@fmask={'fmask'}}]}) [ 107.292557][ T7588] chnl_net:caif_netlink_parms(): no params data found [ 107.446203][ T7588] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.453326][ T7588] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.486343][ T7588] device bridge_slave_0 entered promiscuous mode [ 107.576483][ T7588] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.583562][ T7588] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.636491][ T7588] device bridge_slave_1 entered promiscuous mode [ 107.679709][ T7585] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.715512][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.724549][ T7618] IPVS: ftp: loaded support on port[0] = 21 [ 107.731111][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.757094][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 107.805415][ T7588] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 107.819741][ T7585] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.859441][ T7590] chnl_net:caif_netlink_parms(): no params data found [ 107.877241][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.885001][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 22:34:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000005400)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=[{0x18, 0x1, 0x1, "d2"}], 0x18}}], 0x2, 0x0) [ 107.916714][ T7588] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 107.987496][ T7588] team0: Port device team_slave_0 added [ 108.019826][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.036490][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.075968][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.083046][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.146611][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.175973][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.216027][ T3012] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.223134][ T3012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.267008][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 108.293977][ T7588] team0: Port device team_slave_1 added [ 108.386675][ T7597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.406979][ T7597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.436150][ T7597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.456504][ T7597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 108.487483][ T7597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.517051][ T7597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 108.540890][ T7597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.570008][ T7597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 22:34:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6c6f636b70726f746f3d64fe2e818458537cda23db19616c6d2c6e6f7265636f766572792c6c6f63616c666c6f636b732c71756f74615f7175616e74756d3d3078303030303030303030303030383030302c6d6574612c61636c2c6d6574612c726772706c76622c6e6f6c6f63636f6f6b69652c6c6f636b7461626c653d6e"]) [ 108.592324][ T7597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.613292][ T7590] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.621250][ T7590] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.630240][ T7590] device bridge_slave_0 entered promiscuous mode [ 108.644752][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 108.664296][ T7621] IPVS: ftp: loaded support on port[0] = 21 [ 108.672143][ T7597] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 108.727344][ T7588] device hsr_slave_0 entered promiscuous mode [ 108.785435][ T7588] device hsr_slave_1 entered promiscuous mode [ 108.825132][ T7588] debugfs: Directory 'hsr0' with parent '/' already present! [ 108.832653][ T7590] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.839956][ T7590] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.849052][ T7590] device bridge_slave_1 entered promiscuous mode [ 108.874247][ T7631] IPVS: ftp: loaded support on port[0] = 21 [ 108.886857][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 108.894253][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 108.904922][ T7585] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 108.921951][ T7590] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 108.958961][ T7590] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 109.024799][ T7590] team0: Port device team_slave_0 added [ 109.051778][ T7618] chnl_net:caif_netlink_parms(): no params data found [ 109.071592][ T7590] team0: Port device team_slave_1 added [ 109.279411][ T7590] device hsr_slave_0 entered promiscuous mode [ 109.335396][ T7590] device hsr_slave_1 entered promiscuous mode [ 109.358028][ C1] hrtimer: interrupt took 25721 ns [ 109.405107][ T7590] debugfs: Directory 'hsr0' with parent '/' already present! [ 109.450365][ T7618] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.460981][ T7618] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.500589][ T7618] device bridge_slave_0 entered promiscuous mode [ 109.518504][ T7588] 8021q: adding VLAN 0 to HW filter on device bond0 22:34:54 executing program 0: socket$kcm(0x11, 0xa, 0x300) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="f05700b06700000000000001"], 0xf) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendfile(r1, r1, &(0x7f0000000140)=0x8800, 0x8800000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x2c) [ 109.559478][ T7621] chnl_net:caif_netlink_parms(): no params data found [ 109.572921][ T7618] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.595121][ T7618] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.614481][ T7618] device bridge_slave_1 entered promiscuous mode [ 109.644456][ T7588] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.675213][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.691599][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.721549][ T7631] chnl_net:caif_netlink_parms(): no params data found [ 109.765222][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.796524][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.857965][ T7670] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.865069][ T7670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.955762][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.992705][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.029908][ T7670] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.037011][ T7670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.139235][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 110.177609][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.236306][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 110.292753][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.367272][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.383383][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.458076][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.488978][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.518916][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.545335][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.651028][ T7588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 110.681437][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 110.695837][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 22:34:55 executing program 0: socket$kcm(0x11, 0xa, 0x300) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="f05700b06700000000000001"], 0xf) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendfile(r1, r1, &(0x7f0000000140)=0x8800, 0x8800000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x2c) [ 110.738455][ T7618] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 110.788319][ T7621] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.817863][ T7621] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.870159][ T7621] device bridge_slave_0 entered promiscuous mode [ 110.879647][ T7639] ================================================================== [ 110.887761][ T7639] BUG: KCSAN: data-race in pipe_wait / put_pipe_info [ 110.894411][ T7639] [ 110.896726][ T7639] read to 0xffff8880b90cf1cc of 4 bytes by task 7640 on cpu 1: [ 110.904291][ T7639] pipe_wait+0xd7/0x140 [ 110.908524][ T7639] pipe_read+0x3b1/0x5e0 [ 110.912761][ T7639] new_sync_read+0x389/0x4f0 [ 110.917338][ T7639] __vfs_read+0xb1/0xc0 [ 110.921478][ T7639] vfs_read+0x143/0x2c0 [ 110.925615][ T7639] ksys_read+0xd5/0x1b0 [ 110.929752][ T7639] __x64_sys_read+0x4c/0x60 [ 110.934253][ T7639] do_syscall_64+0xcc/0x370 [ 110.938738][ T7639] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.944606][ T7639] [ 110.946920][ T7639] write to 0xffff8880b90cf1cc of 4 bytes by task 7639 on cpu 0: [ 110.954532][ T7639] put_pipe_info+0x4d/0xb0 [ 110.958925][ T7639] pipe_release+0x152/0x1b0 [ 110.963405][ T7639] __fput+0x1e1/0x520 [ 110.967370][ T7639] ____fput+0x1f/0x30 [ 110.971341][ T7639] task_work_run+0xf6/0x130 [ 110.975836][ T7639] exit_to_usermode_loop+0x2b4/0x2c0 [ 110.981103][ T7639] do_syscall_64+0x353/0x370 [ 110.985676][ T7639] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.991545][ T7639] [ 110.993851][ T7639] Reported by Kernel Concurrency Sanitizer on: [ 110.999984][ T7639] CPU: 0 PID: 7639 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 111.007155][ T7639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.017191][ T7639] ================================================================== [ 111.025238][ T7639] Kernel panic - not syncing: panic_on_warn set ... [ 111.031808][ T7639] CPU: 0 PID: 7639 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 111.038975][ T7639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.049008][ T7639] Call Trace: [ 111.052281][ T7639] dump_stack+0x11d/0x181 [ 111.056595][ T7639] panic+0x210/0x640 [ 111.060477][ T7639] ? vprintk_func+0x8d/0x140 [ 111.065058][ T7639] kcsan_report.cold+0xc/0xd [ 111.069638][ T7639] kcsan_setup_watchpoint+0x3fe/0x460 [ 111.075008][ T7639] __tsan_unaligned_write4+0xc4/0x100 [ 111.080364][ T7639] put_pipe_info+0x4d/0xb0 [ 111.084774][ T7639] pipe_release+0x152/0x1b0 [ 111.089259][ T7639] __fput+0x1e1/0x520 [ 111.093219][ T7639] ? put_pipe_info+0xb0/0xb0 [ 111.097798][ T7639] ____fput+0x1f/0x30 [ 111.101767][ T7639] task_work_run+0xf6/0x130 [ 111.106258][ T7639] exit_to_usermode_loop+0x2b4/0x2c0 [ 111.111530][ T7639] do_syscall_64+0x353/0x370 [ 111.116105][ T7639] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 111.121989][ T7639] RIP: 0033:0x7f3e6f5da2b0 [ 111.126394][ T7639] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 111.145993][ T7639] RSP: 002b:00007ffc85e592c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 111.154396][ T7639] RAX: 0000000000000000 RBX: 00007f3e6f88f7a0 RCX: 00007f3e6f5da2b0 [ 111.162385][ T7639] RDX: 00007f3e6f890df0 RSI: 0000000000000001 RDI: 0000000000000001 [ 111.170340][ T7639] RBP: 0000000000000000 R08: 00007f3e6fcd3700 R09: 00007f3e6fcd3700 [ 111.178294][ T7639] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 111.186249][ T7639] R13: 0000000000000001 R14: 0000000000d2e160 R15: 0000000000000000 [ 111.195608][ T7639] Kernel Offset: disabled [ 111.199932][ T7639] Rebooting in 86400 seconds..