Warning: Permanently added '10.128.10.17' (ECDSA) to the list of known hosts. 2020/06/28 07:49:28 fuzzer started 2020/06/28 07:49:28 dialing manager at 10.128.0.105:40161 2020/06/28 07:49:29 syscalls: 3105 2020/06/28 07:49:29 code coverage: enabled 2020/06/28 07:49:29 comparison tracing: enabled 2020/06/28 07:49:29 extra coverage: enabled 2020/06/28 07:49:29 setuid sandbox: enabled 2020/06/28 07:49:29 namespace sandbox: enabled 2020/06/28 07:49:29 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/28 07:49:29 fault injection: enabled 2020/06/28 07:49:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/28 07:49:29 net packet injection: enabled 2020/06/28 07:49:29 net device setup: enabled 2020/06/28 07:49:29 concurrency sanitizer: enabled 2020/06/28 07:49:29 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/28 07:49:29 USB emulation: enabled 2020/06/28 07:49:29 suppressing KCSAN reports in functions: 'alloc_pid' '__ext4_new_inode' 07:49:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') dup(r0) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="240000004e001f00ff07f4f9002304000a04", 0x12) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0xe0002011}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000000)={0xe0002011}) r2 = epoll_create(0x6) r3 = openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000000)={0xe0002011}) epoll_wait(r2, &(0x7f0000000100)=[{}], 0x1, 0x0) r4 = epoll_create(0x6) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0xe0002011}) epoll_wait(r4, &(0x7f0000000100)=[{}], 0x1, 0x0) epoll_create(0x6) r5 = open(&(0x7f0000000200)='.\x00', 0x0, 0x101) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f00000000c0)='./file0\x00') mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3a) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r6, &(0x7f0000000180)='./file0\x00', r5, &(0x7f0000000640)='./file0/file0\x00', 0x0) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r7, &(0x7f00000000c0)='./file0\x00') syzkaller login: [ 35.570927][ T8644] IPVS: ftp: loaded support on port[0] = 21 [ 35.631093][ T8644] chnl_net:caif_netlink_parms(): no params data found [ 35.663733][ T8644] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.670920][ T8644] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.682248][ T8644] device bridge_slave_0 entered promiscuous mode [ 35.690307][ T8644] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.697477][ T8644] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.705555][ T8644] device bridge_slave_1 entered promiscuous mode 07:49:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000200)={0x20, r1, 0x1, 0x0, 0x0, {0x3}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) [ 35.728253][ T8644] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.739718][ T8644] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.775116][ T8644] team0: Port device team_slave_0 added [ 35.789175][ T8644] team0: Port device team_slave_1 added [ 35.813491][ T8644] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.828232][ T8644] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.857743][ T8644] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.873773][ T8798] IPVS: ftp: loaded support on port[0] = 21 [ 35.881501][ T8644] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.893946][ T8644] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.921107][ T8644] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 07:49:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) syz_open_procfs(0x0, 0x0) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x81) bind(r1, &(0x7f00000000c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000016012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c954"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200019) dup(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x6a, 0x40, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x40) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) [ 36.000615][ T8644] device hsr_slave_0 entered promiscuous mode [ 36.068027][ T8644] device hsr_slave_1 entered promiscuous mode 07:49:32 executing program 3: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x2, 0x3, 0x2d8, 0x190, 0x190, 0x7c, 0x17000000, 0x0, 0x240, 0x240, 0x240, 0x240, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x190, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "bdc74c01369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa6ecab6b1d2cc05e3182f64694d7d05fb8b8c8f56627a54f905d564eeeb8334f650ca0f3c44f7fda4d20a55050342ea85ecc8838e7088de33582f36a0a375bb7008adc297a5ece1bb2df53d17bef26bb6f800", 0x7f, 0x2}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x338) [ 36.145435][ T8830] IPVS: ftp: loaded support on port[0] = 21 [ 36.212601][ T8798] chnl_net:caif_netlink_parms(): no params data found [ 36.314871][ T8798] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.341967][ T8798] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.350541][ T8798] device bridge_slave_0 entered promiscuous mode [ 36.361040][ T8830] chnl_net:caif_netlink_parms(): no params data found [ 36.383252][ T8644] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.390633][ T9018] IPVS: ftp: loaded support on port[0] = 21 07:49:32 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f00000000c0)=""/4102, &(0x7f0000001140)=0x1006) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xa, 0x4000000032, 0xffffffffffffffff, 0x0) [ 36.450043][ T8798] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.457187][ T8798] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.478174][ T8798] device bridge_slave_1 entered promiscuous mode [ 36.507623][ T8644] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.540387][ T8644] netdevsim netdevsim0 netdevsim2: renamed from eth2 07:49:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) [ 36.620097][ T8644] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.689238][ T8798] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.732281][ T8830] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.741852][ T9107] IPVS: ftp: loaded support on port[0] = 21 [ 36.750261][ T8830] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.759877][ T8830] device bridge_slave_0 entered promiscuous mode [ 36.771556][ T8830] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.781292][ T8830] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.789194][ T8830] device bridge_slave_1 entered promiscuous mode [ 36.796845][ T8798] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.827217][ T8830] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.837267][ T9018] chnl_net:caif_netlink_parms(): no params data found [ 36.855312][ T8830] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.855601][ T9221] IPVS: ftp: loaded support on port[0] = 21 [ 36.871219][ T8798] team0: Port device team_slave_0 added [ 36.878589][ T8798] team0: Port device team_slave_1 added [ 36.922973][ T8798] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.930042][ T8798] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.956824][ T8798] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.969835][ T8830] team0: Port device team_slave_0 added [ 36.983187][ T8830] team0: Port device team_slave_1 added [ 37.001224][ T8830] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.008427][ T8830] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.035162][ T8830] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.049906][ T8644] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.057911][ T8798] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.064949][ T8798] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.091373][ T8798] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.105901][ T9018] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.113117][ T9018] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.120658][ T9018] device bridge_slave_0 entered promiscuous mode [ 37.128985][ T9018] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.136575][ T9018] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.144033][ T9018] device bridge_slave_1 entered promiscuous mode [ 37.151045][ T8830] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.158083][ T8830] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.184954][ T8830] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.201651][ T8644] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.219570][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.227194][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.309142][ T8830] device hsr_slave_0 entered promiscuous mode [ 37.347588][ T8830] device hsr_slave_1 entered promiscuous mode [ 37.387435][ T8830] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.395156][ T8830] Cannot create hsr debugfs directory [ 37.448996][ T8798] device hsr_slave_0 entered promiscuous mode [ 37.488467][ T8798] device hsr_slave_1 entered promiscuous mode [ 37.527362][ T8798] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.527368][ T8798] Cannot create hsr debugfs directory [ 37.533758][ T9107] chnl_net:caif_netlink_parms(): no params data found [ 37.552434][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.561529][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.570098][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.577104][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.587845][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 37.606074][ T9018] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.656265][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.665639][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.674017][ T9088] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.681054][ T9088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.688876][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 37.697392][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 37.706715][ T9018] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.728979][ T9107] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.736060][ T9107] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.744563][ T9107] device bridge_slave_0 entered promiscuous mode [ 37.770585][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 37.781433][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 37.791149][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 37.799784][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 37.813227][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 37.822405][ T9107] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.829715][ T9107] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.837884][ T9107] device bridge_slave_1 entered promiscuous mode [ 37.848232][ T8830] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.885193][ T9221] chnl_net:caif_netlink_parms(): no params data found [ 37.903011][ T5050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.911869][ T5050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.923748][ T9018] team0: Port device team_slave_0 added [ 37.931475][ T9018] team0: Port device team_slave_1 added [ 37.937871][ T8830] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.969270][ T8830] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.999547][ T9107] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.011754][ T9107] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.029575][ T8830] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 38.089740][ T3372] ================================================================== [ 38.094196][ T8644] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.097833][ T3372] BUG: KCSAN: data-race in copy_process / copy_process [ 38.097836][ T3372] [ 38.097844][ T3372] write to 0xffffffff89281410 of 4 bytes by task 29 on cpu 1: [ 38.097851][ T3372] copy_process+0x2e53/0x32b0 [ 38.097865][ T3372] _do_fork+0xf1/0x660 [ 38.111477][ T8644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 38.115133][ T3372] kernel_thread+0x85/0xb0 [ 38.133149][ T8644] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.133580][ T3372] call_usermodehelper_exec_work+0x4f/0x1b0 [ 38.157649][ T3372] process_one_work+0x3cb/0x990 [ 38.162488][ T3372] worker_thread+0x665/0xbe0 [ 38.163096][ T8644] device veth0_vlan entered promiscuous mode [ 38.167071][ T3372] kthread+0x210/0x220 [ 38.167083][ T3372] ret_from_fork+0x1f/0x30 [ 38.167085][ T3372] [ 38.167098][ T3372] read to 0xffffffff89281410 of 4 bytes by task 3372 on cpu 0: [ 38.181069][ T8644] device veth1_vlan entered promiscuous mode [ 38.182222][ T3372] copy_process+0xab5/0x32b0 [ 38.201128][ T8644] device veth0_macvtap entered promiscuous mode [ 38.202722][ T3372] _do_fork+0xf1/0x660 [ 38.213029][ T3372] kernel_thread+0x85/0xb0 [ 38.213911][ T8644] device veth1_macvtap entered promiscuous mode [ 38.217431][ T3372] call_usermodehelper_exec_work+0x4f/0x1b0 [ 38.217440][ T3372] process_one_work+0x3cb/0x990 [ 38.217447][ T3372] worker_thread+0x665/0xbe0 [ 38.217456][ T3372] kthread+0x210/0x220 [ 38.217473][ T3372] ret_from_fork+0x1f/0x30 [ 38.236224][ T8644] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.238914][ T3372] [ 38.238917][ T3372] Reported by Kernel Concurrency Sanitizer on: [ 38.238929][ T3372] CPU: 0 PID: 3372 Comm: kworker/u4:5 Not tainted 5.8.0-rc2-syzkaller #0 [ 38.238934][ T3372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.238950][ T3372] Workqueue: events_unbound call_usermodehelper_exec_work [ 38.238956][ T3372] ================================================================== [ 38.238965][ T3372] Kernel panic - not syncing: panic_on_warn set ... [ 38.245885][ T8644] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.247412][ T3372] CPU: 0 PID: 3372 Comm: kworker/u4:5 Not tainted 5.8.0-rc2-syzkaller #0 [ 38.247417][ T3372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.247432][ T3372] Workqueue: events_unbound call_usermodehelper_exec_work [ 38.247437][ T3372] Call Trace: [ 38.247453][ T3372] dump_stack+0x10f/0x19d [ 38.247462][ T3372] panic+0x1f8/0x63a [ 38.247478][ T3372] ? vprintk_emit+0x44a/0x4f0 [ 38.352095][ T3372] kcsan_report+0x684/0x690 [ 38.356579][ T3372] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 38.362100][ T3372] ? copy_process+0xab5/0x32b0 [ 38.366851][ T3372] ? _do_fork+0xf1/0x660 [ 38.371068][ T3372] ? kernel_thread+0x85/0xb0 [ 38.375636][ T3372] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 38.381678][ T3372] ? process_one_work+0x3cb/0x990 [ 38.386696][ T3372] ? worker_thread+0x665/0xbe0 [ 38.391435][ T3372] ? kthread+0x210/0x220 [ 38.395669][ T3372] ? ret_from_fork+0x1f/0x30 [ 38.400245][ T3372] ? debug_smp_processor_id+0x18/0x20 [ 38.405596][ T3372] ? do_machine_check+0xe90/0x15d0 [ 38.410693][ T3372] ? copy_creds+0x280/0x350 [ 38.415185][ T3372] ? copy_creds+0x280/0x350 [ 38.419700][ T3372] kcsan_setup_watchpoint+0x453/0x4d0 [ 38.425046][ T3372] ? copy_creds+0x280/0x350 [ 38.429540][ T3372] copy_process+0xab5/0x32b0 [ 38.434259][ T3372] ? check_preempt_wakeup+0x1cb/0x370 [ 38.439654][ T3372] ? proc_cap_handler+0x280/0x280 [ 38.444687][ T3372] _do_fork+0xf1/0x660 [ 38.448750][ T3372] ? check_preemption_disabled+0x8f/0x1a0 [ 38.454452][ T3372] ? proc_cap_handler+0x280/0x280 [ 38.459454][ T3372] kernel_thread+0x85/0xb0 [ 38.464561][ T3372] ? proc_cap_handler+0x280/0x280 [ 38.469567][ T3372] call_usermodehelper_exec_work+0x4f/0x1b0 [ 38.475451][ T3372] process_one_work+0x3cb/0x990 [ 38.480373][ T3372] worker_thread+0x665/0xbe0 [ 38.484942][ T3372] ? finish_task_switch+0x8b/0x270 [ 38.490029][ T3372] ? process_one_work+0x990/0x990 [ 38.495026][ T3372] kthread+0x210/0x220 [ 38.499087][ T3372] ? process_one_work+0x990/0x990 [ 38.504086][ T3372] ? constant_test_bit+0x30/0x30 [ 38.509001][ T3372] ret_from_fork+0x1f/0x30 [ 38.514664][ T3372] Kernel Offset: disabled [ 38.518978][ T3372] Rebooting in 86400 seconds..