[info] Using makefile-style concurrent boot in runlevel 2. [ 47.245553][ T26] audit: type=1800 audit(1574750824.833:21): pid=7444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 47.294339][ T26] audit: type=1800 audit(1574750824.833:22): pid=7444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.102' (ECDSA) to the list of known hosts. 2019/11/26 06:47:13 fuzzer started 2019/11/26 06:47:15 dialing manager at 10.128.0.105:37257 2019/11/26 06:47:15 syscalls: 2566 2019/11/26 06:47:15 code coverage: enabled 2019/11/26 06:47:15 comparison tracing: enabled 2019/11/26 06:47:15 extra coverage: extra coverage is not supported by the kernel 2019/11/26 06:47:15 setuid sandbox: enabled 2019/11/26 06:47:15 namespace sandbox: enabled 2019/11/26 06:47:15 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/26 06:47:15 fault injection: enabled 2019/11/26 06:47:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/26 06:47:15 net packet injection: enabled 2019/11/26 06:47:15 net device setup: enabled 2019/11/26 06:47:15 concurrency sanitizer: enabled 2019/11/26 06:47:15 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 71.952819][ T7610] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/26 06:47:42 adding functions to KCSAN blacklist: 'rfcomm_sock_sendmsg' '__skb_try_recv_from_queue' 'handle_userfault' 'shmem_add_to_page_cache' 'do_readlinkat' 'xas_find_marked' '__delete_from_page_cache' '__filemap_fdatawrite_range' '__add_to_page_cache_locked' 'iput' '__writeback_single_inode' 'calc_timer_values' 'ep_poll' 'ext4_free_inodes_count' 'futex_wait_queue_me' 'ktime_get_seconds' 'd_delete' 'blk_mq_free_request' 'exit_signals' 'run_timer_softirq' 'ext4_free_inode' 'atime_needs_update' 'snd_seq_check_queue' 'common_perm_cond' 'other_inode_match' 'd_set_mounted' 'dd_has_work' 'mem_cgroup_select_victim_node' 'virtqueue_enable_cb_delayed' 'fib6_clean_node' '__release_sock' 'bio_endio' '__dentry_kill' 'add_timer' 'tick_nohz_idle_stop_tick' 'kauditd_thread' 'virtqueue_disable_cb' 'generic_fillattr' 'sctp_assoc_migrate' 'page_counter_charge' 'ext4_setattr' 'pcpu_alloc' 'sbitmap_queue_clear' 'rcu_gp_fqs_loop' 'do_signal_stop' 'ip_tunnel_xmit' 'ext4_mb_good_group' 'percpu_counter_add_batch' 'snd_ctl_notify' 'do_exit' 'shmem_getpage_gfp' 'generic_permission' 'n_tty_receive_buf_common' 'bio_chain' 'wbt_done' '__mark_inode_dirty' 'wbt_wait' 'commit_echoes' 'writeback_sb_inodes' '__hrtimer_run_queues' '__splice_from_pipe' 'tick_nohz_next_event' 'add_timer_on' 'ext4_nonda_switch' 'audit_log_start' 'fasync_remove_entry' 'af_alg_sendmsg' '__skb_wait_for_more_packets' 'ext4_mb_find_by_goal' 'cma_comp_exch' 'wbc_attach_and_unlock_inode' 'icmp_global_allow' 'packet_do_bind' 'blk_mq_get_request' 'blk_mq_dispatch_rq_list' 'do_syslog' 'ip_finish_output2' 'enqueue_timer' 'yama_ptracer_del' 'unix_release_sock' 'delete_from_page_cache_batch' 'poll_schedule_timeout' 'pid_update_inode' 'sit_tunnel_xmit' '__ext4_new_inode' 'evict' 'userfaultfd_ioctl' 'tick_do_update_jiffies64' '__perf_event_overflow' 'file_remove_privs' 'p9_poll_workfn' 'ns_capable_common' 'netlink_getname' 'find_next_bit' 'generic_write_end' 'ext4_mark_iloc_dirty' '__process_echoes' 'd_instantiate_new' 'ext4_da_write_end' 'ondemand_readahead' 'snd_seq_prioq_cell_out' 'tcp_add_backlog' 'xas_clear_mark' 'shmem_file_read_iter' 'batadv_tt_local_add' 'kcm_rcv_strparser' 'blk_stat_add' 'process_srcu' 'watchdog' 'filemap_map_pages' 'lookup_fast' '__rcu_read_unlock' 'vm_area_dup' 'tomoyo_supervisor' 'copy_process' 'find_get_pages_range_tag' 'pipe_wait' 'wbt_issue' 'ip6_dst_gc' 'kvm_mmu_notifier_invalidate_range_end' 'ext4_has_free_clusters' 'do_nanosleep' 'ktime_get_real_seconds' 'hrtimer_wakeup' 'do_task_stat' 'ext4_xattr_get' 'do_recvmmsg' 'echo_char' 'generic_file_read_iter' 'ext4_writepages' 'tomoyo_update_stat' 'blk_mq_sched_dispatch_requests' 'wbc_detach_inode' 'get_signal' 'inode_permission' 'install_new_memslots' '__d_lookup_done' 'taskstats_exit' 'tick_sched_do_timer' 'rcu_gp_fqs_check_wake' 'sctp_association_free' 'pipe_poll' 'page_counter_try_charge' 'inet_sk_diag_fill' '__lru_cache_add' 'blk_mq_run_hw_queue' 'complete_signal' 'relay_switch_subbuf' 'lruvec_lru_size' 'flush_workqueue' '__snd_rawmidi_transmit_ack' 'xprt_clear_locked' 'ksys_read' '__dev_queue_xmit' 'snd_seq_timer_get_cur_tick' 'timer_clear_idle' 'list_lru_count_one' 'inactive_list_is_low' 06:52:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000cc0)=""/4096, 0xd00e}) fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000005c80)=0x9, 0xfffffffffffffff9) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000240), 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x5, &(0x7f0000000140)=[{0x0, 0x1, 0x46a, 0x2b}, {0x5, 0x6e4, 0xffffffffffffffff}, {0x0, 0x8001}, {0x0, 0x4, 0x3, 0x101}, {0x1, 0x7fffffff}]}) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000000180)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) ptrace$setopts(0x4206, r4, 0x0, 0x0) ioprio_set$pid(0x3, r4, 0x5) r5 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0xffffffffffff8538, 0x400200) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'irlan0\x00', {0x2, 0x0, @empty}}) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) getdents64(r2, &(0x7f0000000080)=""/24, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) r6 = dup2(r4, r5) r7 = socket$packet(0x11, 0x3, 0x300) sendfile(r7, r6, &(0x7f0000000080), 0x8000091b) r8 = socket$inet6(0xa, 0x80002, 0x0) accept4(r8, 0x0, &(0x7f0000000900), 0x800) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x500, 0x0, 0x102, 0x100000000000001}, 0x20) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r8, r9) read$rfkill(0xffffffffffffffff, &(0x7f0000000500), 0x1000000be) syz_open_dev$swradio(0x0, 0x1, 0x2) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @reserved}, 0x10) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x228302, 0x0) write$UHID_SET_REPORT_REPLY(r10, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xc) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil}) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r12, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_DEASSIGN_PCI_DEVICE(r12, 0x4040ae72, 0x0) r13 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r13, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r13, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xffffffffffffff10) ioctl$ifreq_SIOCGIFINDEX_vcan(r13, 0x8933, &(0x7f0000000300)={'vcan0\x00', r14}) r15 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x480020, 0x0) getdents64(r15, &(0x7f00000000c0)=""/189, 0xbd) [ 351.137882][ T7662] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.187367][ T7662] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.243742][ T7662] device bridge_slave_0 entered promiscuous mode [ 351.308124][ T7662] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.354560][ T7662] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.374600][ T7739] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 351.394520][ T7662] device bridge_slave_1 entered promiscuous mode [ 351.459125][ T7650] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.514012][ T7650] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.548142][ T7650] device bridge_slave_0 entered promiscuous mode [ 351.649236][ T7618] 8021q: adding VLAN 0 to HW filter on device bond0 [ 351.685780][ T7654] bridge0: port 1(bridge_slave_0) entered blocking state 06:52:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000100)="bd384ce1f54f7c522811c090bbf4ef7b4926a15e53a1bbb46854e2666d3327c6ae8e714ad8116298b6e23a4b036512e680d8864f6e29ae93b95733e5d0164691a37189b857a07bae4ee2995204e470c4c5ae2742f1a98076174e9420fa41857fbd21c794423e7851022eb84c0059c29ec119542880d2e770e56b498dfc425e4fdc7abdf6be20499b8bb6eb267a31a66c683c0feb6ecc488f3a2dc72e6db795aad7b717787df3b8e32eba76dddafc94c432d52ad8d07cc2cd9e3831e868ed4781c75508b8b07196c7b2", 0xc9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x138}}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x80000001, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x570, 0x11, 0x0, 0x27) [ 351.744307][ T7654] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.752076][ T7654] device bridge_slave_0 entered promiscuous mode [ 351.817209][ T7654] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.874723][ T7654] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.882545][ T7654] device bridge_slave_1 entered promiscuous mode [ 351.937834][ T7650] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.957477][ T7650] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.995322][ T7650] device bridge_slave_1 entered promiscuous mode [ 352.031259][ T7662] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 352.100835][ T7618] 8021q: adding VLAN 0 to HW filter on device team0 [ 352.161664][ T7662] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 352.215860][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.235790][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.285839][ T7650] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 352.332623][ T7650] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 352.391194][ T7654] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 352.436059][ T7654] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 352.554146][ T7662] team0: Port device team_slave_0 added [ 352.597801][ T7662] team0: Port device team_slave_1 added [ 352.612630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.664165][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.707662][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.714779][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.772867][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 352.822807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 06:52:10 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) accept$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040), 0x4) getpid() getpid() r2 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fec000/0x13000)=nil) shmat(r2, &(0x7f0000fef000/0x1000)=nil, 0x5000) r3 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)) msgctl$IPC_SET(r3, 0x1, 0x0) r4 = socket(0x11, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000180)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) r6 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4b}, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4b}, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000400)={{0x0, r5, r6, 0x0, r7, 0x0, 0x81}, 0x7fffffff, 0x1b, 0x4, 0x8771, 0xb5, 0x2, r8, r9}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f00000006c0)=0x0) r12 = getpid() sched_setscheduler(r12, 0x5, 0x0) prlimit64(r12, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setscheduler(0x0, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000900)={{0x20, 0x0, r6, r10, r11, 0x4}, 0x8, 0x4, 0x401, 0x1f, r12, 0x0, 0x661}) clock_adjtime(0x3, &(0x7f0000000500)={0x0, 0x2000000, 0x0, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x200, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0x0, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x7, 0x5, 0x6, 0x7ff}) r13 = semget$private(0x0, 0x4, 0x0) semop(r13, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000080)) [ 352.875312][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.882489][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.994851][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 353.060928][ T7620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 353.113060][ T7618] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 06:52:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xb}}, 0x1c) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x1, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) dup2(0xffffffffffffffff, r0) write$vhci(0xffffffffffffffff, 0x0, 0x0) [ 353.160873][ T7618] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 353.299269][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 353.307830][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 353.345332][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 353.353927][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 353.401823][ C0] hrtimer: interrupt took 24215 ns [ 353.459822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 353.517533][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 353.558152][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.617776][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.661913][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.711116][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.769896][ T7650] team0: Port device team_slave_0 added [ 353.783383][ T7620] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.855735][ T7654] team0: Port device team_slave_0 added [ 353.887898][ T7617] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 353.908545][ T7617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 353.947795][ T7617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 353.967508][ T7617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.994992][ T7617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 354.014994][ T7617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.047729][ T7617] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.054850][ T7617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.092821][ T7650] team0: Port device team_slave_1 added [ 354.116682][ T7662] device hsr_slave_0 entered promiscuous mode [ 354.154636][ T7662] device hsr_slave_1 entered promiscuous mode [ 354.194460][ T7662] debugfs: Directory 'hsr0' with parent '/' already present! [ 354.205633][ T7654] team0: Port device team_slave_1 added [ 354.212616][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 354.223270][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 354.232334][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.240729][ T3012] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.247808][ T3012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.277258][ T7618] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 354.313281][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 354.322477][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 354.330491][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 354.338492][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 354.355280][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 354.364172][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 354.373244][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 354.382367][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 354.391546][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 354.400521][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.456771][ T7650] device hsr_slave_0 entered promiscuous mode [ 354.488008][ T7650] device hsr_slave_1 entered promiscuous mode [ 354.524373][ T7650] debugfs: Directory 'hsr0' with parent '/' already present! [ 354.579587][ T7654] device hsr_slave_0 entered promiscuous mode [ 354.644626][ T7654] device hsr_slave_1 entered promiscuous mode [ 354.674385][ T7654] debugfs: Directory 'hsr0' with parent '/' already present! [ 354.687986][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 354.715165][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 354.725353][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.758239][ T7620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 354.897986][ T7620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 354.996417][ T7644] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 355.003928][ T7644] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 355.327097][ T7654] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.337112][ T7662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.411021][ T7650] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.460536][ T7662] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.497551][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.537879][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.591136][ T7650] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.667946][ T7654] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.730305][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.744849][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.752712][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 06:52:13 executing program 1: unshare(0x20040600) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) [ 355.874928][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.944674][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.014824][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.023228][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.030300][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.164909][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.237800][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.284818][ T3012] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.291951][ T3012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.397531][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 356.510253][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 356.538382][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.629465][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.709847][ T7651] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.716995][ T7651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.770828][ T7874] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) [ 356.837413][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.907758][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.973005][ T7651] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.980095][ T7651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.077467][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 357.138380][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 357.205786][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.272192][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.339593][ T7651] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.346691][ T7651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.404866][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.461710][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.523634][ T7651] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.530992][ T7651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.608689][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 357.662528][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 357.718187][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 357.774021][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 357.833588][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 357.891562][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 357.949314][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 358.019784][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 358.077635][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 358.130698][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 358.186911][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 358.247871][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 358.308859][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 358.384166][ T7662] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 358.452257][ T7662] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 358.541038][ T7654] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 358.595654][ T7654] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 358.676078][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 358.716262][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 358.750977][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 358.794134][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 358.832478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 358.872402][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 358.918007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 358.956879][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 359.001022][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.019670][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 359.030552][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.041256][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 359.051317][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.060367][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 359.068919][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.077728][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 359.086349][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.095242][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 359.103715][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.114590][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 359.132947][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 359.140810][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 359.148991][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 359.156801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 359.174825][ T7662] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 359.191106][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 06:52:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = request_key(&(0x7f0000000280)='big_key\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='eth1cpusetsecuritywlan1\'vmnet1:/\x00', 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000580)="8d1a9fcfc0eb9e252d411fe61f767c99afd0bdf1f6ef38cb78d86d37b76f33332703d03b8310a8b6910485089edecba58c810be1fb35ebb60638c3551b256a277b810e12402c17fc94514bd6a09079aca84bddf771d2b5017ad0d6485e7db59526bee9af9ca358560023462e25934984ee7522e8c7d2392ea6041989a485c939b5b366c641df05b3a07113469d719f49a8dcc755a726c4aa7262ee2559b2b58ee18de53a0a59e1e38c3937dc8d309131ac373b78d7e899725581de870bdf251271788158010f44edd1c542e633dd835fa1c49d45d2d4a89bec7c4a2add7b1d5db495c07fc348ab4a3f8725042b72b151872cd50b9221714349b9a97a4e18", 0xfe, 0x0) keyctl$unlink(0x9, r1, r2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r4, 0xc100565c, &(0x7f0000000480)={0x8, 0xffffffff, 0x3, {0x2, @raw_data="c5d57e1409c8c8bfc4b0a6a48600000000000000020adc9ee376a40807fdd9774aece3e8b95da34ee175d3529bc03c3401cbd467e3a00b3f010000000000000064954192aa37c8b5d52de4df78b6ea9e89a2c13f92b9f7650b89fdf12ca7c48762bc81646f92b9f2270c1a324c9820fd0525a8c381ccd94247dfa06a9362cdade36c5ee4e0463288dced378801a8dad713036ecfa51add03337e4cc1d3d7cdea4a9d986641334404b67bd660b034ebd574d306b651d8b3a7d05256fd530399284944818300"}}) ioctl$VIDIOC_S_FMT(r4, 0x40045612, &(0x7f0000000100)={0x2, @pix_mp={0x1, 0x0, 0x0, 0x0, 0x0, [{}, {0x100008}, {0x1}, {}, {}, {0x0, 0x4000000}, {0xfffffffc}], 0x0, 0x0, 0x1, 0x0, 0x1}}) ioctl$VIDIOC_S_FMT(r4, 0x40045612, &(0x7f0000000100)={0x2, @raw_data="aac1eb190a8183fbf2e0f81421eafc9c73151c4fc5d81ce47cdf6d846ded5221f0c1c01071c095c7efd5930762c22862b6f51520f710126ce5fa74dc676983904fe9f73904c421e5f6fa4eb0440c2a2786b9887e6118ac8d96289ca12e82b719e1df39d5c9842527254e8598c7a6abe073b57ebc9848647554aa89a31eeded40d86291167d8d8dc7e03fc3efeb68066e4d177ff22edee38cac201f201a21b1bafc536ead391e4b3c7debc452648ab3e0e735d82c50f2d0923cdcf25de3739f152dd7a768a27fb8ab"}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\xff', 0x1ff) sendfile(r3, r5, 0x0, 0x320f) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r7, r8, r9) r10 = socket$inet6(0xa, 0x400000000001, 0x0) close(r10) r11 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) stat(&(0x7f0000000700)='./bus\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r11, r12, r13) chown(&(0x7f0000000200)='./file0\x00', r8, r13) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000002000/0x2000)=nil) [ 359.198932][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 359.206781][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 359.214969][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 359.227411][ T7650] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 359.236521][ T7654] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 359.290970][ T7910] ================================================================== [ 359.299115][ T7910] BUG: KCSAN: data-race in d_alloc_parallel / d_set_d_op [ 359.306129][ T7910] [ 359.308468][ T7910] read to 0xffff888125635240 of 4 bytes by task 7911 on cpu 0: [ 359.316137][ T7910] d_alloc_parallel+0x884/0xe00 [ 359.320995][ T7910] __lookup_slow+0xb4/0x2a0 [ 359.325511][ T7910] lookup_slow+0x4f/0x70 [ 359.329768][ T7910] walk_component+0x4a2/0xe70 [ 359.334446][ T7910] path_lookupat.isra.0+0x13a/0x5a0 [ 359.339652][ T7910] filename_lookup+0x145/0x2b0 [ 359.344421][ T7910] user_path_at_empty+0x4c/0x70 [ 359.349270][ T7910] vfs_statx+0xd9/0x190 [ 359.353494][ T7910] __do_sys_newstat+0x51/0xb0 [ 359.358179][ T7910] __x64_sys_newstat+0x3a/0x50 [ 359.362933][ T7910] do_syscall_64+0xcc/0x370 [ 359.367432][ T7910] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 359.373319][ T7910] [ 359.375649][ T7910] write to 0xffff888125635240 of 4 bytes by task 7910 on cpu 1: [ 359.383284][ T7910] d_set_d_op+0x17b/0x230 [ 359.387623][ T7910] simple_lookup+0xaa/0xb0 [ 359.392034][ T7910] __lookup_slow+0x129/0x2a0 [ 359.396751][ T7910] lookup_slow+0x4f/0x70 [ 359.400978][ T7910] walk_component+0x4a2/0xe70 [ 359.405649][ T7910] path_lookupat.isra.0+0x13a/0x5a0 [ 359.410841][ T7910] filename_lookup+0x145/0x2b0 [ 359.415604][ T7910] user_path_at_empty+0x4c/0x70 [ 359.420452][ T7910] vfs_statx+0xd9/0x190 [ 359.424603][ T7910] __do_sys_newstat+0x51/0xb0 [ 359.429277][ T7910] __x64_sys_newstat+0x3a/0x50 [ 359.434174][ T7910] do_syscall_64+0xcc/0x370 [ 359.438680][ T7910] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 359.444559][ T7910] [ 359.446875][ T7910] Reported by Kernel Concurrency Sanitizer on: [ 359.453009][ T7910] CPU: 1 PID: 7910 Comm: modprobe Not tainted 5.4.0-rc7+ #0 [ 359.460410][ T7910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.470460][ T7910] ================================================================== [ 359.478529][ T7910] Kernel panic - not syncing: panic_on_warn set ... [ 359.485125][ T7910] CPU: 1 PID: 7910 Comm: modprobe Not tainted 5.4.0-rc7+ #0 [ 359.492407][ T7910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.502449][ T7910] Call Trace: [ 359.505731][ T7910] dump_stack+0x11d/0x181 [ 359.510058][ T7910] panic+0x210/0x640 [ 359.513952][ T7910] ? vprintk_func+0x8d/0x140 [ 359.518541][ T7910] kcsan_report.cold+0xc/0xd [ 359.523233][ T7910] kcsan_setup_watchpoint+0x3fe/0x460 [ 359.529306][ T7910] __tsan_unaligned_write4+0xc4/0x100 [ 359.534679][ T7910] d_set_d_op+0x17b/0x230 [ 359.539011][ T7910] simple_lookup+0xaa/0xb0 [ 359.543411][ T7910] __lookup_slow+0x129/0x2a0 [ 359.548008][ T7910] lookup_slow+0x4f/0x70 [ 359.552260][ T7910] walk_component+0x4a2/0xe70 [ 359.557117][ T7910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.563361][ T7910] ? link_path_walk.part.0+0x77f/0xa90 [ 359.568817][ T7910] ? page_add_file_rmap+0xf6/0x480 [ 359.573920][ T7910] path_lookupat.isra.0+0x13a/0x5a0 [ 359.579160][ T7910] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 359.584885][ T7910] ? __read_once_size.constprop.0+0x12/0x20 [ 359.590773][ T7910] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 359.597079][ T7910] filename_lookup+0x145/0x2b0 [ 359.601881][ T7910] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 359.608125][ T7910] ? strncpy_from_user+0x219/0x2b0 [ 359.613236][ T7910] user_path_at_empty+0x4c/0x70 [ 359.618074][ T7910] vfs_statx+0xd9/0x190 [ 359.622225][ T7910] __do_sys_newstat+0x51/0xb0 [ 359.626889][ T7910] ? _raw_spin_unlock_irq+0x68/0x80 [ 359.632075][ T7910] ? mem_cgroup_handle_over_high+0x50/0x180 [ 359.637959][ T7910] ? __read_once_size.constprop.0+0x12/0x20 [ 359.643848][ T7910] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 359.650081][ T7910] ? debug_smp_processor_id+0x4c/0x172 [ 359.655539][ T7910] __x64_sys_newstat+0x3a/0x50 [ 359.660318][ T7910] do_syscall_64+0xcc/0x370 [ 359.664820][ T7910] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 359.670712][ T7910] RIP: 0033:0x7fcd8a0acc65 [ 359.675143][ T7910] Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 90 90 90 90 90 90 90 90 83 ff 01 48 89 f0 77 18 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 359.694752][ T7910] RSP: 002b:00007fff47a12458 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 359.703156][ T7910] RAX: ffffffffffffffda RBX: 00007fcd8a378481 RCX: 00007fcd8a0acc65 [ 359.711121][ T7910] RDX: 00007fff47a12550 RSI: 00007fff47a12550 RDI: 00007fcd8a378481 [ 359.719075][ T7910] RBP: 00007fcd8a57d2f0 R08: 00007fcd8a363ef8 R09: 00007fcd8a100070 [ 359.727031][ T7910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000561ae0eb1160 [ 359.734990][ T7910] R13: 00007fff47a12683 R14: 0000000000000010 R15: 00055facc785c680 [ 359.744379][ T7910] Kernel Offset: disabled [ 359.748708][ T7910] Rebooting in 86400 seconds..