Warning: Permanently added '10.128.15.201' (ECDSA) to the list of known hosts. 2019/12/11 21:36:10 fuzzer started 2019/12/11 21:36:12 dialing manager at 10.128.0.105:44805 2019/12/11 21:36:12 syscalls: 2689 2019/12/11 21:36:12 code coverage: enabled 2019/12/11 21:36:12 comparison tracing: enabled 2019/12/11 21:36:12 extra coverage: extra coverage is not supported by the kernel 2019/12/11 21:36:12 setuid sandbox: enabled 2019/12/11 21:36:12 namespace sandbox: enabled 2019/12/11 21:36:12 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/11 21:36:12 fault injection: enabled 2019/12/11 21:36:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/11 21:36:12 net packet injection: enabled 2019/12/11 21:36:12 net device setup: enabled 2019/12/11 21:36:12 concurrency sanitizer: enabled 2019/12/11 21:36:12 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 61.573369][ T7641] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/11 21:36:25 adding functions to KCSAN blacklist: 'ext4_nonda_switch' 'other_inode_match' 'ktime_get_seconds' 'do_exit' 'icmp_global_allow' 'blk_mq_sched_dispatch_requests' 'ktime_get_real_seconds' 'bio_chain' 'pipe_wait' 'list_lru_count_one' 'futex_wait_queue_me' 'generic_update_time' 'tick_nohz_next_event' 'rcu_gp_fqs_check_wake' 'find_group_orlov' '__ext4_new_inode' 'ep_poll' 'audit_log_start' 'l2tp_tunnel_del_work' 'dd_has_work' 'ext4_free_inode' 'common_perm_cond' 'vm_area_dup' 'xas_clear_mark' 'copy_process' 'queue_access_lock' 'tcp_add_backlog' '__lru_cache_add' 'blk_mq_run_hw_queue' 'ext4_ext_insert_extent' 'tomoyo_domain_quota_is_ok' 'xas_find_marked' 'ext4_free_inodes_count' 'generic_write_end' 'poll_schedule_timeout' 'do_nanosleep' 'echo_char' 'do_syslog' 'tick_nohz_idle_stop_tick' 'snd_seq_check_queue' 'wbt_done' 'generic_permission' 'page_counter_try_charge' 'atime_needs_update' 'skb_dequeue' 'tick_sched_do_timer' '__delete_from_page_cache' 'lruvec_lru_size' 'kcm_rfree' 'mem_cgroup_select_victim_node' 'shmem_add_to_page_cache' 'lookup_fast' 'run_timer_softirq' 'taskstats_exit' 'ext4_has_free_clusters' 'kauditd_thread' 'wbc_detach_inode' 'mod_timer' 'process_srcu' 'add_timer' 'n_tty_receive_buf_common' 'find_next_bit' 'blk_mq_dispatch_rq_list' 'wbt_issue' 'hrtimer_wakeup' 'find_get_pages_range_tag' 'blk_mq_get_request' 'timer_clear_idle' '__fsnotify_parent' 'tick_do_update_jiffies64' 'generic_fillattr' '__snd_rawmidi_transmit_ack' 'file_update_time' 'pcpu_alloc' 'add_timer_on' 'sit_tunnel_xmit' 'virtqueue_disable_cb' '__hrtimer_run_queues' 'tomoyo_supervisor' 'pipe_poll' 'pid_update_inode' 21:39:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0), 0xc) [ 273.269783][ T7643] IPVS: ftp: loaded support on port[0] = 21 21:39:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0xb) mkdir(0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="020700090200000000008000bd5a00000021472aefe41c4301889c91ff7f000000001600aa20675d9f82d3869feeed860ec0c904000000cad7cb69050046a6e50e067f000000000000c1374611"], 0x10}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) mount(&(0x7f0000000540)=ANY=[@ANYBLOB="2f0000763007f2ff003000af874ca965c2626374b3933691143f6c00e29507449b404d620fc9aa17fe18f841a0192b5a591f06000000498ea5562d0c5b2e2556ae0b"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 273.356790][ T7643] chnl_net:caif_netlink_parms(): no params data found [ 273.388109][ T7643] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.395545][ T7643] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.403220][ T7643] device bridge_slave_0 entered promiscuous mode [ 273.411583][ T7643] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.434733][ T7643] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.442418][ T7643] device bridge_slave_1 entered promiscuous mode [ 273.474902][ T7643] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 273.491220][ T7643] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.521824][ T7643] team0: Port device team_slave_0 added [ 273.532978][ T7647] IPVS: ftp: loaded support on port[0] = 21 [ 273.540296][ T7643] team0: Port device team_slave_1 added 21:39:50 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffe29, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000006060501ff0000fffdffff2ef6ff04550c000100060000f77d0a01050c0002"], 0x23}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 273.596924][ T7643] device hsr_slave_0 entered promiscuous mode [ 273.654971][ T7643] device hsr_slave_1 entered promiscuous mode [ 273.727837][ T7649] IPVS: ftp: loaded support on port[0] = 21 [ 273.835097][ T7643] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.842182][ T7643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.849500][ T7643] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.856613][ T7643] bridge0: port 1(bridge_slave_0) entered forwarding state 21:39:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4, 0x34000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) [ 274.122463][ T7649] chnl_net:caif_netlink_parms(): no params data found [ 274.181914][ T7647] chnl_net:caif_netlink_parms(): no params data found [ 274.267949][ T7649] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.326129][ T7649] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.355424][ T7649] device bridge_slave_0 entered promiscuous mode [ 274.397080][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.426712][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.451940][ T7677] IPVS: ftp: loaded support on port[0] = 21 [ 274.458144][ T7649] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.485157][ T7649] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.492836][ T7649] device bridge_slave_1 entered promiscuous mode [ 274.538831][ T7643] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.555186][ T7647] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.562235][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.595533][ T7647] device bridge_slave_0 entered promiscuous mode [ 274.616804][ T7647] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.623867][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.695575][ T7647] device bridge_slave_1 entered promiscuous mode [ 274.747628][ T7649] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.778038][ T7649] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:39:52 executing program 4: seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x2, 0x0) [ 274.815938][ T7647] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.901790][ T7647] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 274.940882][ T7643] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.975801][ T7649] team0: Port device team_slave_0 added [ 274.982347][ T7646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.990906][ T7646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.056661][ T7647] team0: Port device team_slave_0 added [ 275.062926][ T7649] team0: Port device team_slave_1 added [ 275.107385][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.125208][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.166698][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.173880][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.218000][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.260700][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.283535][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.290639][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.327301][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 275.365665][ T7647] team0: Port device team_slave_1 added 21:39:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002600050f0012e0713c444d240400fc00100002400a000000053582c137153e370900040002000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x100000a}, 0x0) [ 275.372523][ T7646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 275.439134][ T7649] device hsr_slave_0 entered promiscuous mode [ 275.505091][ T7649] device hsr_slave_1 entered promiscuous mode [ 275.534820][ T7649] debugfs: Directory 'hsr0' with parent '/' already present! [ 275.550324][ T7680] IPVS: ftp: loaded support on port[0] = 21 [ 275.576629][ T7647] device hsr_slave_0 entered promiscuous mode [ 275.625078][ T7647] device hsr_slave_1 entered promiscuous mode [ 275.674783][ T7647] debugfs: Directory 'hsr0' with parent '/' already present! [ 275.691512][ T7677] chnl_net:caif_netlink_parms(): no params data found [ 275.700284][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 275.708922][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 275.718327][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 275.726949][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 275.735483][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 275.744093][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.752552][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 275.760885][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 275.770656][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 275.798431][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 275.822340][ T7643] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 275.866164][ T7692] IPVS: ftp: loaded support on port[0] = 21 [ 275.872213][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.904865][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.026676][ T7677] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.045028][ T7677] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.052890][ T7677] device bridge_slave_0 entered promiscuous mode [ 276.101438][ T7677] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.145636][ T7677] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.153679][ T7677] device bridge_slave_1 entered promiscuous mode [ 276.289571][ T7677] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 276.396070][ T7677] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 276.475432][ T7677] team0: Port device team_slave_0 added [ 276.548397][ T7649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.602157][ T7677] team0: Port device team_slave_1 added [ 276.651769][ T7680] chnl_net:caif_netlink_parms(): no params data found [ 276.681431][ T7649] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.729433][ T7647] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.783280][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.817917][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.880384][ T7647] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.957087][ T7677] device hsr_slave_0 entered promiscuous mode [ 277.004987][ T7677] device hsr_slave_1 entered promiscuous mode [ 277.034814][ T7677] debugfs: Directory 'hsr0' with parent '/' already present! [ 277.064629][ T7649] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 277.139292][ T7649] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 277.200050][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.222102][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.270675][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.277820][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.339811][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.389995][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.433246][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.440427][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.494294][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 277.539079][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.579792][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.617535][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.658259][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 277.688926][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 277.723957][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 277.765283][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.815314][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 277.857566][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.897858][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.943208][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.024852][ T7692] chnl_net:caif_netlink_parms(): no params data found [ 278.040219][ T7646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.058366][ T7646] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:39:55 executing program 0: clone(0x401fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x2, 0x20, 0x100000023, 0x0, 0xffffffffffffffff, 0x0, [0x3]}, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bond0\x00\x05H\x00L l\x00\x11z\x03', 0xffb}) r2 = accept4$x25(r1, 0x0, &(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$P9_RCREATE(r3, 0x0, 0x0) [ 278.092527][ T7646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.130789][ T7646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.195172][ T7646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.268277][ T7646] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.275379][ T7646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.289679][ T7702] ================================================================== [ 278.297819][ T7702] BUG: KCSAN: data-race in do_brk_flags / task_mem [ 278.304301][ T7702] [ 278.306631][ T7702] read to 0xffff88812482cb00 of 8 bytes by task 7729 on cpu 0: [ 278.314439][ T7702] task_mem+0xd0/0x450 [ 278.318510][ T7702] proc_pid_status+0x825/0x1000 [ 278.323356][ T7702] proc_single_show+0x89/0xe0 [ 278.328035][ T7702] seq_read+0x350/0x960 [ 278.332185][ T7702] __vfs_read+0x67/0xc0 [ 278.336329][ T7702] vfs_read+0x143/0x2c0 [ 278.340481][ T7702] ksys_read+0xd5/0x1b0 [ 278.344627][ T7702] __x64_sys_read+0x4c/0x60 [ 278.349128][ T7702] do_syscall_64+0xcc/0x370 [ 278.353627][ T7702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.359499][ T7702] [ 278.361823][ T7702] write to 0xffff88812482cb00 of 8 bytes by task 7702 on cpu 1: [ 278.369449][ T7702] do_brk_flags+0x3c2/0x690 [ 278.373955][ T7702] vm_brk_flags+0x121/0x1c0 [ 278.378460][ T7702] set_brk+0xdf/0x100 [ 278.382436][ T7702] load_elf_binary+0x11eb/0x2ec0 [ 278.387371][ T7702] search_binary_handler+0x127/0x420 [ 278.392650][ T7702] __do_execve_file.isra.0+0xb76/0x11d0 [ 278.398192][ T7702] __x64_sys_execve+0x62/0x80 [ 278.402869][ T7702] do_syscall_64+0xcc/0x370 [ 278.407385][ T7702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.413258][ T7702] [ 278.415574][ T7702] Reported by Kernel Concurrency Sanitizer on: [ 278.421728][ T7702] CPU: 1 PID: 7702 Comm: ifup Not tainted 5.4.0-syzkaller #0 [ 278.429090][ T7702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.439136][ T7702] ================================================================== [ 278.447188][ T7702] Kernel panic - not syncing: panic_on_warn set ... [ 278.453775][ T7702] CPU: 1 PID: 7702 Comm: ifup Not tainted 5.4.0-syzkaller #0 [ 278.461137][ T7702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.471195][ T7702] Call Trace: [ 278.474480][ T7702] dump_stack+0x11d/0x181 [ 278.478819][ T7702] panic+0x210/0x640 [ 278.482730][ T7702] ? __read_once_size+0x40/0xe0 [ 278.487579][ T7702] ? vprintk_func+0x8d/0x140 [ 278.492183][ T7702] kcsan_report.cold+0xc/0xd [ 278.496786][ T7702] kcsan_setup_watchpoint+0x3fe/0x460 [ 278.502165][ T7702] __tsan_unaligned_write8+0xc4/0x100 [ 278.507541][ T7702] do_brk_flags+0x3c2/0x690 [ 278.512049][ T7702] vm_brk_flags+0x121/0x1c0 [ 278.516561][ T7702] set_brk+0xdf/0x100 [ 278.520547][ T7702] load_elf_binary+0x11eb/0x2ec0 [ 278.525488][ T7702] ? __read_once_size.constprop.0+0x12/0x20 [ 278.531389][ T7702] ? __sanitizer_cov_trace_cmp8+0x11/0x20 [ 278.537138][ T7702] search_binary_handler+0x127/0x420 [ 278.542433][ T7702] __do_execve_file.isra.0+0xb76/0x11d0 [ 278.547992][ T7702] __x64_sys_execve+0x62/0x80 [ 278.552678][ T7702] do_syscall_64+0xcc/0x370 [ 278.557186][ T7702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.563079][ T7702] RIP: 0033:0x7f0d7c676207 [ 278.567502][ T7702] Code: Bad RIP value. [ 278.571564][ T7702] RSP: 002b:00007ffe23e61848 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 278.579974][ T7702] RAX: ffffffffffffffda RBX: 0000000001e445f8 RCX: 00007f0d7c676207 [ 278.587950][ T7702] RDX: 0000000001e44618 RSI: 0000000001e445f8 RDI: 0000000001e44678 [ 278.595918][ T7702] RBP: 0000000001e44678 R08: 0000000001e44598 R09: 00007f0d7c6eda00 [ 278.603891][ T7702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001e44618 [ 278.611866][ T7702] R13: 0000000001e44618 R14: 0000000000000001 R15: 0000000000000000 [ 278.621239][ T7702] Kernel Offset: disabled [ 278.625567][ T7702] Rebooting in 86400 seconds..