Warning: Permanently added '10.128.10.63' (ECDSA) to the list of known hosts. 2019/12/12 05:46:17 fuzzer started 2019/12/12 05:46:19 dialing manager at 10.128.0.105:39821 2019/12/12 05:46:20 syscalls: 2689 2019/12/12 05:46:20 code coverage: enabled 2019/12/12 05:46:20 comparison tracing: enabled 2019/12/12 05:46:20 extra coverage: extra coverage is not supported by the kernel 2019/12/12 05:46:20 setuid sandbox: enabled 2019/12/12 05:46:20 namespace sandbox: enabled 2019/12/12 05:46:20 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/12 05:46:20 fault injection: enabled 2019/12/12 05:46:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/12 05:46:20 net packet injection: enabled 2019/12/12 05:46:20 net device setup: enabled 2019/12/12 05:46:20 concurrency sanitizer: enabled 2019/12/12 05:46:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/12/12 05:46:23 adding functions to KCSAN blacklist: 'ext4_nonda_switch' 'blk_mq_sched_dispatch_requests' 'blk_mq_dispatch_rq_list' 'ktime_get_real_seconds' 'lruvec_lru_size' 'tomoyo_supervisor' 'vm_area_dup' 'pipe_wait' '__splice_from_pipe' 'tick_sched_do_timer' 'ext4_free_inode' 'xas_clear_mark' 'tcp_add_backlog' 'find_next_bit' 'tick_do_update_jiffies64' 'blk_mq_get_request' 'add_timer' 'run_timer_softirq' '__hrtimer_run_queues' 'mod_timer' 'tick_nohz_idle_stop_tick' 'ep_poll' 'pipe_poll' 'taskstats_exit' 'rcu_gp_fqs_check_wake' 'generic_write_end' 05:46:36 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0xffffffff) sendmmsg(r0, &(0x7f0000005c00), 0x2b2, 0x0) syzkaller login: [ 74.058096][ T7627] IPVS: ftp: loaded support on port[0] = 21 05:46:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@dev, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000a1fe0)={@dev, 0x400, 0x0, 0xff}, 0x20) close(r0) [ 74.129136][ T7627] chnl_net:caif_netlink_parms(): no params data found [ 74.174135][ T7627] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.192717][ T7627] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.222623][ T7627] device bridge_slave_0 entered promiscuous mode [ 74.230122][ T7627] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.252471][ T7627] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.260231][ T7627] device bridge_slave_1 entered promiscuous mode [ 74.298789][ T7627] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.309316][ T7627] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.323044][ T7630] IPVS: ftp: loaded support on port[0] = 21 [ 74.328878][ T7627] team0: Port device team_slave_0 added [ 74.336613][ T7627] team0: Port device team_slave_1 added 05:46:37 executing program 2: setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) [ 74.427064][ T7627] device hsr_slave_0 entered promiscuous mode [ 74.493334][ T7627] device hsr_slave_1 entered promiscuous mode [ 74.630178][ T7632] IPVS: ftp: loaded support on port[0] = 21 05:46:37 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$KDGKBMODE(r0, 0x4b3b, &(0x7f0000000000)) [ 74.696553][ T7627] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.703659][ T7627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.711093][ T7627] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.718157][ T7627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.048138][ T7630] chnl_net:caif_netlink_parms(): no params data found [ 75.066360][ T7627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.120172][ T7627] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.120706][ T7659] IPVS: ftp: loaded support on port[0] = 21 [ 75.168136][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.202700][ T3513] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.232698][ T3513] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.253992][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 75.356524][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.384049][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.423605][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.430881][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 05:46:38 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4003) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=0x0], 0x17) close(r0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000180)='\x00'], 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000100)='\x00', &(0x7f0000000200)='\x00'], 0x0) [ 75.463834][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.493804][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.521789][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.528893][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.593932][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 75.623345][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.659050][ T7632] chnl_net:caif_netlink_parms(): no params data found [ 75.669343][ T7630] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.683304][ T7630] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.723493][ T7630] device bridge_slave_0 entered promiscuous mode [ 75.759850][ T7627] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 75.802413][ T7627] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 75.856932][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.885357][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.915139][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.943384][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.973416][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.003001][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.024449][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.052741][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.076363][ T7630] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.084215][ T7630] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.091870][ T7630] device bridge_slave_1 entered promiscuous mode [ 76.159589][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.169740][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.201573][ T7627] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.215660][ T7665] IPVS: ftp: loaded support on port[0] = 21 [ 76.228165][ T7630] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 05:46:38 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@initdev={0xfe, 0x88, [0x0, 0x7a], 0x0, 0x0}, 0x4, r4}) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e23, @loopback}}) r5 = dup(r2) getsockopt$inet6_tcp_int(r5, 0x6, 0x1c, 0x0, &(0x7f0000012ffc)=0x80fb268a) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x7) [ 76.247367][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 76.262530][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 76.282091][ T7630] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.353838][ T7630] team0: Port device team_slave_0 added [ 76.359895][ T7632] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.369478][ T7632] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.377686][ T7632] device bridge_slave_0 entered promiscuous mode [ 76.394843][ T7630] team0: Port device team_slave_1 added [ 76.417174][ T7632] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.424342][ T7632] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.431933][ T7632] device bridge_slave_1 entered promiscuous mode [ 76.446324][ T7659] chnl_net:caif_netlink_parms(): no params data found 05:46:39 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0xffffffff) sendmmsg(r0, &(0x7f0000005c00), 0x2b2, 0x0) 05:46:39 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0xffffffff) sendmmsg(r0, &(0x7f0000005c00), 0x2b2, 0x0) [ 76.504362][ T7630] device hsr_slave_0 entered promiscuous mode [ 76.552602][ T7630] device hsr_slave_1 entered promiscuous mode [ 76.592357][ T7630] debugfs: Directory 'hsr0' with parent '/' already present! 05:46:39 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6e217b91c3b0d873722b41afb8ed58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1bae2728316e63e58afdf284732bd1e1970881ddd3c9f310f827c195f3c5d57c67a08466517ba1300000000858003ffffffffffffffff3e26b5ca26bb434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c64000000000000000026a005060000000061e2448f23a7e49736a335440c5b7681c58dc647494f0dbc811becd7c487d283b2d0574510c4fdbb54c61ba9e635c0b3a3df610d9975d1d9570b38026b259815dba598ffa069c01b3d196c15d34a5918d6909192ec97032c320044fa934bf944d6d5ce621d91c17f1c4377a54c7febb46f83a7847a97259b8f1fca2c2816029f82e8e0291f4082d92d0ae76b94a18647bb44cbe9366a08fb3f0502644307c51085f7215fd44635e5967f21e8f59bd021f309d910cb5d37cb318bcba5d105e17bdbb23afadbb7c2144159af5452023e1da0b211c26b19bdabd12da70930e09dc61c5839dd2f25c4966fce417326c6c581e1f524fcc404658378ed01c7ae60702873c1f5d9a97ac06e3064775dd601eb6d53eb4facc3d41f135c4eba79397fc610bd337fba84dcc34f1d8b277d49cca6478849f4863f7474c27c59e6327ec922ea4e880c8ab2ef8ecaf753a4444e1a8d5c9dff5593e9c8cd35"], 0x18}}], 0x1, 0x4048000) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0xffffffff) sendmmsg(r0, &(0x7f0000005c00), 0x2b2, 0x0) [ 76.607967][ T7632] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.609695][ T7682] IPVS: ftp: loaded support on port[0] = 21 [ 76.620571][ T7632] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 05:46:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x1000000020040880, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) [ 76.808868][ T7632] team0: Port device team_slave_0 added [ 76.838706][ T7659] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.849090][ T7659] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.901271][ T7659] device bridge_slave_0 entered promiscuous mode [ 76.937974][ T7632] team0: Port device team_slave_1 added 05:46:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000100)={0x0, 0x2, 0x3, 0x67}) ioctl$KDSKBLED(r0, 0x4b65, 0x0) getresuid(0x0, &(0x7f0000000340), &(0x7f0000000380)) r1 = geteuid() semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x17528577f06cc64}, 0x90, 0x0, 0x4}) getresuid(0x0, &(0x7f0000000340), &(0x7f0000000380)) geteuid() mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x51000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7d90035e}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, 'devtmpfs\x00'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, 'overlay\x00'}}, {@measure='measure'}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, 'userselinuxmd5sumwlan0em0/'}}]}}) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) getdents64(r3, &(0x7f0000000280)=""/121, 0x200002f9) [ 76.981603][ T7659] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.992392][ T7659] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.016756][ T7659] device bridge_slave_1 entered promiscuous mode [ 77.188135][ T7665] chnl_net:caif_netlink_parms(): no params data found [ 77.209393][ T7659] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.265172][ C1] hrtimer: interrupt took 25451 ns [ 77.284492][ T7632] device hsr_slave_0 entered promiscuous mode [ 77.312683][ T7632] device hsr_slave_1 entered promiscuous mode [ 77.342487][ T7632] debugfs: Directory 'hsr0' with parent '/' already present! [ 77.359306][ T7659] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.413326][ T7682] chnl_net:caif_netlink_parms(): no params data found [ 77.424908][ T7630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.492845][ T7659] team0: Port device team_slave_0 added [ 77.499811][ T7659] team0: Port device team_slave_1 added [ 77.590610][ T7630] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.690784][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.722949][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.804425][ T7659] device hsr_slave_0 entered promiscuous mode [ 77.832806][ T7659] device hsr_slave_1 entered promiscuous mode [ 77.892501][ T7659] debugfs: Directory 'hsr0' with parent '/' already present! [ 77.910487][ T7665] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.952713][ T7665] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.992576][ T7665] device bridge_slave_0 entered promiscuous mode 05:46:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000100)={0x0, 0x2, 0x3, 0x67}) ioctl$KDSKBLED(r0, 0x4b65, 0x0) getresuid(0x0, &(0x7f0000000340), &(0x7f0000000380)) r1 = geteuid() semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x17528577f06cc64}, 0x90, 0x0, 0x4}) getresuid(0x0, &(0x7f0000000340), &(0x7f0000000380)) geteuid() mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x51000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7d90035e}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user', 0x3d, 'devtmpfs\x00'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, 'overlay\x00'}}, {@measure='measure'}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, 'userselinuxmd5sumwlan0em0/'}}]}}) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) getdents64(r3, &(0x7f0000000280)=""/121, 0x200002f9) [ 78.042408][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.051029][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.115248][ T7649] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.122472][ T7649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.193047][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.255835][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.302704][ T7649] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.309840][ T7649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.336618][ T7627] ================================================================== [ 78.344753][ T7627] BUG: KCSAN: data-race in do_nanosleep / get_task_mm [ 78.351550][ T7627] [ 78.353901][ T7627] read to 0xffff888126b980a4 of 4 bytes by task 7709 on cpu 0: [ 78.361458][ T7627] get_task_mm+0x4f/0xa0 [ 78.365709][ T7627] do_task_stat+0xe2/0x1370 [ 78.370213][ T7627] proc_tgid_stat+0x3d/0x60 [ 78.374720][ T7627] proc_single_show+0x89/0xe0 [ 78.379395][ T7627] seq_read+0x350/0x960 [ 78.383065][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.383575][ T7627] __vfs_read+0x67/0xc0 [ 78.395661][ T7627] vfs_read+0x143/0x2c0 [ 78.399822][ T7627] ksys_read+0xd5/0x1b0 [ 78.403970][ T7627] __x64_sys_read+0x4c/0x60 [ 78.408482][ T7627] do_syscall_64+0xcc/0x370 [ 78.412987][ T7627] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 78.418963][ T7627] [ 78.421293][ T7627] write to 0xffff888126b980a4 of 4 bytes by task 7627 on cpu 1: [ 78.428930][ T7627] do_nanosleep+0x14d/0x320 [ 78.432614][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.433447][ T7627] hrtimer_nanosleep+0x191/0x320 [ 78.446239][ T7627] __x64_sys_nanosleep+0x106/0x150 [ 78.451354][ T7627] do_syscall_64+0xcc/0x370 [ 78.455855][ T7627] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 78.461733][ T7627] [ 78.464051][ T7627] Reported by Kernel Concurrency Sanitizer on: [ 78.470200][ T7627] CPU: 1 PID: 7627 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 78.478426][ T7627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.482395][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.488483][ T7627] ================================================================== [ 78.504402][ T7627] Kernel panic - not syncing: panic_on_warn set ... [ 78.510988][ T7627] CPU: 1 PID: 7627 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 78.519212][ T7627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.529260][ T7627] Call Trace: [ 78.532558][ T7627] dump_stack+0x11d/0x181 [ 78.536899][ T7627] panic+0x210/0x640 [ 78.540799][ T7627] ? vprintk_func+0x8d/0x140 [ 78.545425][ T7627] kcsan_report.cold+0xc/0xd [ 78.550024][ T7627] kcsan_setup_watchpoint+0x3fe/0x460 [ 78.553093][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.555404][ T7627] __tsan_unaligned_write4+0xc4/0x100 [ 78.568556][ T7627] do_nanosleep+0x14d/0x320 [ 78.573075][ T7627] ? hrtimer_init_sleeper+0x80/0x180 [ 78.578359][ T7627] ? __do_sys_wait4+0x7f/0x100 [ 78.583285][ T7627] hrtimer_nanosleep+0x191/0x320 [ 78.588230][ T7627] ? hrtimer_active+0x1a0/0x1a0 [ 78.593095][ T7627] __x64_sys_nanosleep+0x106/0x150 [ 78.598220][ T7627] do_syscall_64+0xcc/0x370 [ 78.602731][ T7627] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 78.603284][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.608627][ T7627] RIP: 0033:0x458db0 [ 78.620519][ T7627] Code: c0 5b 5d c3 66 0f 1f 44 00 00 8b 04 24 48 83 c4 18 5b 5d c3 66 0f 1f 44 00 00 83 3d 81 fb 61 00 00 75 14 b8 23 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 d4 d1 fb ff c3 48 83 ec 08 e8 ea 46 00 00 [ 78.640139][ T7627] RSP: 002b:00007ffff6d454b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 [ 78.648557][ T7627] RAX: ffffffffffffffda RBX: 00000000000131fb RCX: 0000000000458db0 [ 78.656529][ T7627] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffff6d454c0 [ 78.663237][ T7649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.664502][ T7627] RBP: 0000000000000012 R08: 0000000000000001 R09: 0000000002891940 [ 78.680238][ T7627] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 78.688308][ T7627] R13: 00007ffff6d45510 R14: 0000000000013158 R15: 00007ffff6d45520 [ 78.697743][ T7627] Kernel Offset: disabled [ 78.702231][ T7627] Rebooting in 86400 seconds..