[ 53.146344][ T25] audit: type=1800 audit(1573490194.990:26): pid=7992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 53.184976][ T25] audit: type=1800 audit(1573490194.990:27): pid=7992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 53.205659][ T25] audit: type=1800 audit(1573490194.990:28): pid=7992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.001463][ T25] audit: type=1800 audit(1573490195.880:29): pid=7992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts. 2019/11/11 16:36:44 fuzzer started 2019/11/11 16:36:46 dialing manager at 10.128.0.105:44241 2019/11/11 16:36:48 syscalls: 2566 2019/11/11 16:36:48 code coverage: enabled 2019/11/11 16:36:48 comparison tracing: enabled 2019/11/11 16:36:48 extra coverage: extra coverage is not supported by the kernel 2019/11/11 16:36:48 setuid sandbox: enabled 2019/11/11 16:36:48 namespace sandbox: enabled 2019/11/11 16:36:48 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/11 16:36:48 fault injection: enabled 2019/11/11 16:36:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/11 16:36:48 net packet injection: enabled 2019/11/11 16:36:48 net device setup: enabled 2019/11/11 16:36:48 concurrency sanitizer: enabled 2019/11/11 16:36:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/11 16:36:52 adding functions to KCSAN blacklist: 'tcp_add_backlog' 'wbt_done' 'run_timer_softirq' 'ext4_free_inode' 'ext4_has_free_clusters' 'n_tty_receive_buf_common' 'tomoyo_supervisor' 'rcu_gp_fqs_check_wake' '__ext4_new_inode' 'taskstats_exit' 'vm_area_dup' 'tick_sched_do_timer' 'tick_do_update_jiffies64' 'echo_char' 'ep_poll' 'ktime_get_real_seconds' 'pipe_poll' 'fsnotify' 'file_update_time' '__hrtimer_run_queues' 'find_get_pages_range_tag' 'common_perm_cond' '__add_to_page_cache_locked' '__ip6_datagram_connect' 'tick_nohz_idle_stop_tick' 'p9_poll_workfn' 'pid_update_inode' 'generic_permission' 'find_next_bit' 'generic_write_end' 16:37:16 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)) syzkaller login: [ 94.374001][ T8165] IPVS: ftp: loaded support on port[0] = 21 16:37:16 executing program 1: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0xffe6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x1, 0x100000040) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x0f\x0f\'@\x00', @ifru_flags}) [ 94.482350][ T8165] chnl_net:caif_netlink_parms(): no params data found [ 94.541445][ T8165] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.566352][ T8165] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.574335][ T8165] device bridge_slave_0 entered promiscuous mode [ 94.582048][ T8165] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.589500][ T8165] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.597385][ T8165] device bridge_slave_1 entered promiscuous mode [ 94.618755][ T8165] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.621620][ T8168] IPVS: ftp: loaded support on port[0] = 21 [ 94.630121][ T8165] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.670523][ T8165] team0: Port device team_slave_0 added [ 94.689024][ T8165] team0: Port device team_slave_1 added 16:37:16 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ash}em\x00', 0x1000, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = memfd_create(&(0x7f00000002c0)=']\xa7}F}\xd7]\xbd\x8f\x12\xfbI\x8488r\xf5\xbe.\xd1\xcc\xf59\xa2d\xb9\xba\xa6\x7f\xf7q\xf4FC\xb8lD\x82\xc5\xdb\n\xa0\xb9\xff\x82\xb4\xd3\xac\x84\xe0o\xa0T\xc6(\x8af\x89\x8d\x96<>\xb7\x8a\bl\xd1\xder\x13Y?\xcb\xf6\xcd\xb69Ett\xfd\xad\xfa\xb8Sy\xf6N\xe3\x9f\xaa\xca\xfba\xc6\xbc\xa6-\xd8\xc8\xdf?\xeeS\r\x83\x8d\xf7\x0e\x9d\x8eb\xc0\x84\xaaW\xe7K\xa3\x14\xf5\x88\x14\xcb\x0f\xc6\xa0\xbdH\x9bOp\aH4m5\xf9\v\x121\xa9\xff\x18\xd5\xfc\xe5v\xacg\xe5\xd3\xff}\xd8l\xbd\x1e\x9c\xbdS-\xa5\x17g\xe1O\xca\x125\xaf\n\xc0\x93\x9f_R\x04\xdd\xf6\x1f\x00\x00\x00\x00\x00\x00\x00\'/\xb2\x8aj\x8d%l\x85a\x93\x96UK\xf2', 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x100000000002}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1=0xe0000300}}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x0, 0x0, &(0x7f0000000d80)) sendfile(r2, r1, &(0x7f0000000140), 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="020700090200000000000000007a5b00d01316f1ffc42840bbc9bf542a1f4aeaab881ff765b36e8cef05d567c4e927bbde694a549dfd64fb92050000002d2ebebeed1ec72a50074379a7068762aaea3ab0495ff227f5e9fc50c80ac90effbb55ff0d9a24a03c7fe083bbd61ccda896e7eee49e15a0a569d5705ade27a712f8ea77bf238605e09373e8b11b0023de5635a004493e84f75fddf38e0ee77212dde162a01385a6eb2af93b2ee0836bcf23bdf17b651b31d205d14da9578625f9106f9cffdf050854cd57423130"], 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) fcntl$F_SET_RW_HINT(r5, 0x40c, &(0x7f0000000280)=0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 94.761231][ T8165] device hsr_slave_0 entered promiscuous mode [ 94.817964][ T8165] device hsr_slave_1 entered promiscuous mode [ 94.972686][ T8168] chnl_net:caif_netlink_parms(): no params data found [ 95.058925][ T8165] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.066088][ T8165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.073429][ T8165] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.080508][ T8165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.135375][ T8182] IPVS: ftp: loaded support on port[0] = 21 [ 95.219229][ T8168] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.247371][ T8168] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.257190][ T8168] device bridge_slave_0 entered promiscuous mode [ 95.333447][ T8165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.368282][ T8168] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.375389][ T8168] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.396364][ T8168] device bridge_slave_1 entered promiscuous mode [ 95.425509][ T8165] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.448416][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.476636][ T3012] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.506494][ T3012] bridge0: port 2(bridge_slave_1) entered disabled state 16:37:17 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpeername(r0, 0x0, &(0x7f00000001c0)) [ 95.548811][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 95.648045][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.676937][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.684084][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.747513][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.777775][ T3012] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.784978][ T3012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.845660][ T8165] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 95.886298][ T8165] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 95.939123][ T8168] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 95.974641][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.998603][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.038961][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.067346][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.098736][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.129391][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.148634][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.177360][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.217566][ T8168] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 96.261686][ T8198] IPVS: ftp: loaded support on port[0] = 21 [ 96.269605][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.288418][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.308108][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.315630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.370492][ T8165] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.406095][ T8182] chnl_net:caif_netlink_parms(): no params data found 16:37:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PACKETS_PER_SLAVE={0x8, 0x9, 0xffffffff}]}}}]}, 0x3c}}, 0x0) [ 96.443463][ T8168] team0: Port device team_slave_0 added [ 96.497268][ T8168] team0: Port device team_slave_1 added [ 96.573908][ T8182] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.596491][ T8182] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.604435][ T8182] device bridge_slave_0 entered promiscuous mode [ 96.617447][ T8182] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.624549][ T8182] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.635931][ T8182] device bridge_slave_1 entered promiscuous mode [ 96.788913][ T8168] device hsr_slave_0 entered promiscuous mode [ 96.816748][ T8168] device hsr_slave_1 entered promiscuous mode 16:37:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getrandom(&(0x7f0000000040)=""/14, 0xe, 0x2) 16:37:18 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)) [ 96.888004][ T8168] debugfs: Directory 'hsr0' with parent '/' already present! [ 96.921450][ T8217] IPVS: ftp: loaded support on port[0] = 21 [ 96.979089][ T8198] chnl_net:caif_netlink_parms(): no params data found [ 97.035122][ T8182] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 16:37:18 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)) [ 97.134830][ T8182] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 97.280177][ T8198] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.306896][ T8198] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.337546][ T8198] device bridge_slave_0 entered promiscuous mode [ 97.377399][ T8198] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.416316][ T8198] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.424310][ T8198] device bridge_slave_1 entered promiscuous mode [ 97.459145][ T8182] team0: Port device team_slave_0 added [ 97.546162][ T8248] IPVS: ftp: loaded support on port[0] = 21 16:37:19 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)) [ 97.588977][ T8198] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 97.632497][ T8182] team0: Port device team_slave_1 added [ 97.703636][ T8198] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 97.734291][ T8168] 8021q: adding VLAN 0 to HW filter on device bond0 16:37:19 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)) [ 97.861597][ T8182] device hsr_slave_0 entered promiscuous mode [ 97.918791][ T8182] device hsr_slave_1 entered promiscuous mode [ 97.946443][ T8182] debugfs: Directory 'hsr0' with parent '/' already present! [ 97.998486][ T8198] team0: Port device team_slave_0 added [ 98.026911][ T8198] team0: Port device team_slave_1 added [ 98.044065][ T8217] chnl_net:caif_netlink_parms(): no params data found [ 98.067257][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 98.076122][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 98.159323][ T8168] 8021q: adding VLAN 0 to HW filter on device team0 16:37:20 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)) [ 98.231694][ T8198] device hsr_slave_0 entered promiscuous mode [ 98.356606][ T8198] device hsr_slave_1 entered promiscuous mode [ 98.409222][ T8198] debugfs: Directory 'hsr0' with parent '/' already present! [ 98.577373][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.605321][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.654366][ T8250] ================================================================== [ 98.662833][ T8250] BUG: KCSAN: data-race in do_nanosleep / task_dump_owner [ 98.670101][ T8250] [ 98.672457][ T8250] write to 0xffff88812a16d064 of 4 bytes by task 8165 on cpu 1: [ 98.680510][ T8250] do_nanosleep+0x127/0x320 [ 98.685168][ T8250] hrtimer_nanosleep+0x191/0x320 [ 98.690146][ T8250] __x64_sys_nanosleep+0x106/0x150 [ 98.695423][ T8250] do_syscall_64+0xcc/0x370 [ 98.700004][ T8250] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 98.705905][ T8250] [ 98.708256][ T8250] read to 0xffff88812a16d064 of 4 bytes by task 8250 on cpu 0: [ 98.716239][ T8250] task_dump_owner+0x43/0x260 [ 98.721063][ T8250] pid_update_inode+0x3c/0x70 [ 98.725913][ T8250] pid_revalidate+0x91/0xd0 [ 98.730447][ T8250] lookup_fast+0x6f2/0x700 [ 98.734914][ T8250] walk_component+0x6d/0xe70 [ 98.739536][ T8250] path_lookupat.isra.0+0x13a/0x5a0 [ 98.745007][ T8250] filename_lookup+0x145/0x2b0 [ 98.749790][ T8250] user_path_at_empty+0x4c/0x70 [ 98.754786][ T8250] vfs_statx+0xd9/0x190 [ 98.758968][ T8250] __do_sys_newstat+0x51/0xb0 [ 98.763822][ T8250] __x64_sys_newstat+0x3a/0x50 [ 98.768614][ T8250] do_syscall_64+0xcc/0x370 [ 98.773254][ T8250] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 98.779313][ T8250] [ 98.781657][ T8250] Reported by Kernel Concurrency Sanitizer on: [ 98.787984][ T8250] CPU: 0 PID: 8250 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 98.794931][ T8250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.805481][ T8250] ================================================================== [ 98.814423][ T8250] Kernel panic - not syncing: panic_on_warn set ... [ 98.821028][ T8250] CPU: 0 PID: 8250 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 98.827942][ T8250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.838157][ T8250] Call Trace: [ 98.841482][ T8250] dump_stack+0xf5/0x159 [ 98.845977][ T8250] panic+0x210/0x640 [ 98.849903][ T8250] ? vprintk_func+0x8d/0x140 [ 98.855192][ T8250] kcsan_report.cold+0xc/0xe [ 98.859821][ T8250] kcsan_setup_watchpoint+0x3fe/0x410 [ 98.865221][ T8250] __tsan_read4+0x145/0x1f0 [ 98.869759][ T8250] task_dump_owner+0x43/0x260 [ 98.874467][ T8250] ? __rcu_read_unlock+0x66/0x3c0 [ 98.879528][ T8250] pid_update_inode+0x3c/0x70 [ 98.884238][ T8250] pid_revalidate+0x91/0xd0 [ 98.888883][ T8250] lookup_fast+0x6f2/0x700 [ 98.893335][ T8250] walk_component+0x6d/0xe70 [ 98.898083][ T8250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.904353][ T8250] ? link_path_walk.part.0+0x77f/0xa90 [ 98.910021][ T8250] path_lookupat.isra.0+0x13a/0x5a0 [ 98.915312][ T8250] ? __read_once_size.constprop.0+0x12/0x20 [ 98.921239][ T8250] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 98.927666][ T8250] filename_lookup+0x145/0x2b0 [ 98.932678][ T8250] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 98.939064][ T8250] ? strncpy_from_user+0x219/0x2b0 [ 98.944222][ T8250] user_path_at_empty+0x4c/0x70 [ 98.949112][ T8250] vfs_statx+0xd9/0x190 [ 98.953299][ T8250] __do_sys_newstat+0x51/0xb0 [ 98.958037][ T8250] ? mem_cgroup_handle_over_high+0x50/0x180 [ 98.964105][ T8250] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 98.970376][ T8250] ? debug_smp_processor_id+0x4c/0x172 [ 98.976107][ T8250] __x64_sys_newstat+0x3a/0x50 [ 98.981027][ T8250] do_syscall_64+0xcc/0x370 [ 98.985691][ T8250] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 98.991607][ T8250] RIP: 0033:0x7fc530dcbc65 [ 98.996167][ T8250] Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 90 90 90 90 90 90 90 90 83 ff 01 48 89 f0 77 18 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 99.015958][ T8250] RSP: 002b:00007ffd72e1a6e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 99.025908][ T8250] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fc530dcbc65 [ 99.034008][ T8250] RDX: 00007fc531299c60 RSI: 00007fc531299c60 RDI: 000000000181a220 [ 99.042502][ T8250] RBP: 0000000000020062 R08: 00007fc5310815a0 R09: 0000000000000000 [ 99.050504][ T8250] R10: 1999999999999999 R11: 0000000000000246 R12: 000000000181a220 [ 99.058654][ T8250] R13: 000000000181a1c0 R14: 0000000000000005 R15: 0000000000000000 [ 99.068923][ T8250] Kernel Offset: disabled [ 99.073431][ T8250] Rebooting in 86400 seconds..