[info] Using makefile-style concurrent boot in runlevel 2. [ 43.300220][ T25] audit: type=1800 audit(1575591738.059:21): pid=7469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 43.348483][ T25] audit: type=1800 audit(1575591738.059:22): pid=7469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.57' (ECDSA) to the list of known hosts. 2019/12/06 00:22:29 fuzzer started 2019/12/06 00:22:31 dialing manager at 10.128.0.105:45173 2019/12/06 00:22:32 syscalls: 2684 2019/12/06 00:22:32 code coverage: enabled 2019/12/06 00:22:32 comparison tracing: enabled 2019/12/06 00:22:32 extra coverage: extra coverage is not supported by the kernel 2019/12/06 00:22:32 setuid sandbox: enabled 2019/12/06 00:22:32 namespace sandbox: enabled 2019/12/06 00:22:32 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/06 00:22:32 fault injection: enabled 2019/12/06 00:22:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/06 00:22:32 net packet injection: enabled 2019/12/06 00:22:32 net device setup: enabled 2019/12/06 00:22:32 concurrency sanitizer: enabled 2019/12/06 00:22:32 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 59.999198][ T7635] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/06 00:22:35 adding functions to KCSAN blacklist: 'generic_fillattr' 'find_next_bit' 'ext4_has_free_clusters' '__hrtimer_run_queues' 'tomoyo_supervisor' 'blk_mq_get_request' 'mod_timer' 'tcp_add_backlog' 'copy_process' 'ext4_nonda_switch' 'do_exit' 'ext4_free_inodes_count' 'ext4_free_inode' 'ep_poll' 'poll_schedule_timeout' 'echo_char' 'dd_has_work' 00:22:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000000000)="4a95c6f761a39bef3bf0062434a51205", 0x10) 00:22:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x4}, @IFLA_GROUP={0x8}]}, 0x2c}}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 69.985062][ T7639] IPVS: ftp: loaded support on port[0] = 21 [ 70.094582][ T7639] chnl_net:caif_netlink_parms(): no params data found 00:22:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x3, 0x4, 0x15}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 70.149631][ T7642] IPVS: ftp: loaded support on port[0] = 21 [ 70.163050][ T7639] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.174071][ T7639] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.182888][ T7639] device bridge_slave_0 entered promiscuous mode [ 70.199824][ T7639] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.207276][ T7639] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.216448][ T7639] device bridge_slave_1 entered promiscuous mode [ 70.253029][ T7639] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.271617][ T7639] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.308480][ T7639] team0: Port device team_slave_0 added [ 70.337128][ T7642] chnl_net:caif_netlink_parms(): no params data found [ 70.346713][ T7639] team0: Port device team_slave_1 added [ 70.388001][ T7645] IPVS: ftp: loaded support on port[0] = 21 00:22:45 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x18, &(0x7f0000000ac0), 0x8) [ 70.441302][ T7639] device hsr_slave_0 entered promiscuous mode [ 70.520057][ T7639] device hsr_slave_1 entered promiscuous mode [ 70.580086][ T7642] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.587234][ T7642] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.595442][ T7642] device bridge_slave_0 entered promiscuous mode [ 70.605609][ T7642] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.613034][ T7642] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.622231][ T7642] device bridge_slave_1 entered promiscuous mode [ 70.668622][ T7642] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.690627][ T7642] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.693523][ T7647] IPVS: ftp: loaded support on port[0] = 21 00:22:45 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000)={0xa0, 0x0, 0x0, 0x0, 0x60}, 0x194, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURBNDELAY(r1, 0x4008550d, &(0x7f0000000080)) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r2 = open(0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r3 = getpid() sched_setscheduler(0x0, 0x5, 0x0) process_vm_readv(r3, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(r2, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000a00)='/dev/cec#\x00', 0xffffffffffffffff}, 0x30) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0) accept$unix(r2, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) syz_open_procfs(r5, &(0x7f0000000140)='net/netstat\x00') ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) [ 70.814216][ T7642] team0: Port device team_slave_0 added [ 70.831501][ T7642] team0: Port device team_slave_1 added [ 70.841911][ T7639] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.849118][ T7639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.856462][ T7639] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.863550][ T7639] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.091164][ T7642] device hsr_slave_0 entered promiscuous mode [ 71.129467][ T7642] device hsr_slave_1 entered promiscuous mode [ 71.160247][ T7642] debugfs: Directory 'hsr0' with parent '/' already present! [ 71.227270][ T7672] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.240804][ T7672] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.290638][ T7673] IPVS: ftp: loaded support on port[0] = 21 [ 71.339494][ T7645] chnl_net:caif_netlink_parms(): no params data found [ 71.516338][ T7639] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.603896][ T7647] chnl_net:caif_netlink_parms(): no params data found [ 71.653748][ T7639] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.689547][ T7645] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.696693][ T7645] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.741499][ T7645] device bridge_slave_0 entered promiscuous mode [ 71.780871][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.800975][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:22:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x0, 0x119}, 0x14}, 0x1, 0xf0ffff}, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 71.847559][ T7642] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.911015][ T7645] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.918183][ T7645] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.980804][ T7645] device bridge_slave_1 entered promiscuous mode [ 72.021088][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.050099][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.080750][ T7667] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.087889][ T7667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.271858][ T7642] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.291049][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.321764][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.360790][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.411090][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.449847][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.456985][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.550129][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.590569][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.630538][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.670191][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.721870][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.770334][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.810218][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.849925][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.888125][ T7639] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 72.929573][ T7639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.981803][ T7705] ================================================================== [ 72.989932][ T7705] BUG: KCSAN: data-race in pipe_wait / put_pipe_info [ 72.996583][ T7705] [ 72.998895][ T7705] read to 0xffff888109d9d7cc of 4 bytes by task 7660 on cpu 0: [ 73.006420][ T7705] pipe_wait+0xd7/0x140 [ 73.010560][ T7705] pipe_read+0x3b1/0x5e0 [ 73.014787][ T7705] new_sync_read+0x389/0x4f0 [ 73.019373][ T7705] __vfs_read+0xb1/0xc0 [ 73.023534][ T7705] vfs_read+0x143/0x2c0 [ 73.027908][ T7705] ksys_read+0xd5/0x1b0 [ 73.032058][ T7705] __x64_sys_read+0x4c/0x60 [ 73.036774][ T7705] do_syscall_64+0xcc/0x370 [ 73.041931][ T7705] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.047801][ T7705] [ 73.050131][ T7705] write to 0xffff888109d9d7cc of 4 bytes by task 7705 on cpu 1: [ 73.057748][ T7705] put_pipe_info+0x4d/0xb0 [ 73.062143][ T7705] pipe_release+0x152/0x1b0 [ 73.066641][ T7705] __fput+0x1e1/0x520 [ 73.070629][ T7705] ____fput+0x1f/0x30 [ 73.074624][ T7705] task_work_run+0xf6/0x130 [ 73.079123][ T7705] exit_to_usermode_loop+0x2b4/0x2c0 [ 73.084397][ T7705] do_syscall_64+0x353/0x370 [ 73.088975][ T7705] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.094938][ T7705] [ 73.097264][ T7705] Reported by Kernel Concurrency Sanitizer on: [ 73.103585][ T7705] CPU: 1 PID: 7705 Comm: net.agent Not tainted 5.4.0-syzkaller #0 [ 73.111512][ T7705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.121827][ T7705] ================================================================== [ 73.129883][ T7705] Kernel panic - not syncing: panic_on_warn set ... [ 73.136459][ T7705] CPU: 1 PID: 7705 Comm: net.agent Not tainted 5.4.0-syzkaller #0 [ 73.144258][ T7705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.154325][ T7705] Call Trace: [ 73.157608][ T7705] dump_stack+0x11d/0x181 [ 73.161927][ T7705] panic+0x210/0x640 [ 73.165824][ T7705] ? vprintk_func+0x8d/0x140 [ 73.170431][ T7705] kcsan_report.cold+0xc/0xd [ 73.175081][ T7705] kcsan_setup_watchpoint+0x3fe/0x460 [ 73.180575][ T7705] __tsan_unaligned_write4+0xc4/0x100 [ 73.185962][ T7705] put_pipe_info+0x4d/0xb0 [ 73.190385][ T7705] pipe_release+0x152/0x1b0 [ 73.194876][ T7705] __fput+0x1e1/0x520 [ 73.198879][ T7705] ? put_pipe_info+0xb0/0xb0 [ 73.203600][ T7705] ____fput+0x1f/0x30 [ 73.207785][ T7705] task_work_run+0xf6/0x130 [ 73.212438][ T7705] exit_to_usermode_loop+0x2b4/0x2c0 [ 73.217710][ T7705] ? __x64_sys_dup2+0x76/0x160 [ 73.222474][ T7705] do_syscall_64+0x353/0x370 [ 73.227068][ T7705] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.232963][ T7705] RIP: 0033:0x7f534c6d99b7 [ 73.237389][ T7705] Code: 73 01 c3 48 8b 0d 81 44 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 b8 21 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 51 44 2b 00 31 d2 48 29 c2 64 [ 73.257204][ T7705] RSP: 002b:00007ffea16d4bd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 73.265694][ T7705] RAX: 0000000000000001 RBX: 0000000000000001 RCX: 00007f534c6d99b7 [ 73.273660][ T7705] RDX: 00000000004022f2 RSI: 0000000000000001 RDI: 000000000000000a [ 73.281620][ T7705] RBP: 0000000000fe0ae0 R08: 00007ffea16d4c20 R09: 0000000000000000 [ 73.289769][ T7705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 73.297726][ T7705] R13: 00007ffea16d4e00 R14: 0000000000000000 R15: 0000000000000000 [ 73.307292][ T7705] Kernel Offset: disabled [ 73.311637][ T7705] Rebooting in 86400 seconds..