[ 52.096225][ T25] audit: type=1800 audit(1573020227.374:27): pid=7812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 52.124325][ T25] audit: type=1800 audit(1573020227.384:28): pid=7812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.031868][ T25] audit: type=1800 audit(1573020228.354:29): pid=7812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 53.055157][ T25] audit: type=1800 audit(1573020228.354:30): pid=7812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.254' (ECDSA) to the list of known hosts. 2019/11/06 06:03:57 fuzzer started 2019/11/06 06:03:59 dialing manager at 10.128.0.105:39303 2019/11/06 06:03:59 syscalls: 2553 2019/11/06 06:03:59 code coverage: enabled 2019/11/06 06:03:59 comparison tracing: enabled 2019/11/06 06:03:59 extra coverage: extra coverage is not supported by the kernel 2019/11/06 06:03:59 setuid sandbox: enabled 2019/11/06 06:03:59 namespace sandbox: enabled 2019/11/06 06:03:59 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 06:03:59 fault injection: enabled 2019/11/06 06:03:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 06:03:59 net packet injection: enabled 2019/11/06 06:03:59 net device setup: enabled 2019/11/06 06:03:59 concurrency sanitizer: enabled 2019/11/06 06:03:59 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 73.576923][ T7977] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/06 06:04:09 adding functions to KCSAN blacklist: 'echo_char' '__hrtimer_run_queues' 'do_nanosleep' 'tick_sched_do_timer' 'blk_mq_sched_dispatch_requests' 'inet_putpeer' 'xas_find_marked' '__dev_queue_xmit' 'generic_write_end' 'page_counter_try_charge' 'ktime_get_with_offset' 'ext4_mb_good_group' 'wbt_done' 'find_next_bit' '__snd_rawmidi_transmit_ack' 'kvm_mmu_notifier_invalidate_range_end' 'ext4_mark_iloc_dirty' 'vm_area_dup' 'generic_fillattr' 'ktime_get_seconds' '__perf_event_overflow' '__delete_from_page_cache' 'run_timer_softirq' 'ext4_has_free_clusters' 'get_wchan' 'osq_lock' 'blk_mq_get_request' 'tick_nohz_idle_stop_tick' 'audit_log_start' 'ext4_nonda_switch' 'tick_do_update_jiffies64' 'xas_clear_mark' 'pipe_poll' 'hrtimer_wakeup' 'ktime_get_real_seconds' 'tomoyo_supervisor' 'process_srcu' 'alloc_empty_file' 'ext4_free_inodes_count' 'sit_tunnel_xmit' '__splice_from_pipe' 'tick_nohz_next_event' 'kauditd_thread' '__alloc_file' 'pid_update_inode' 'fanotify_handle_event' 'generic_permission' 'rcu_gp_fqs_check_wake' 'blk_mq_dispatch_rq_list' 'lruvec_lru_size' 'blk_mq_run_hw_queue' 'ext4_free_inode' 'taskstats_exit' 'p9_poll_workfn' 'add_timer' 'tcp_add_backlog' 'find_get_pages_range_tag' 'poll_schedule_timeout' 'do_syslog' 'task_dump_owner' 'ep_poll' 'do_exit' 'wbt_issue' 'pcpu_alloc' 'mod_timer' '__ext4_new_inode' 'dd_has_work' 'atime_needs_update' 06:06:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000002000)) fcntl$lock(r3, 0x7, &(0x7f0000000040)={0x1, 0x0, 0x1}) fcntl$lock(r3, 0x26, &(0x7f0000000080)) fcntl$lock(r3, 0x26, &(0x7f0000000180)={0x40001}) dup3(r2, r3, 0x0) 06:06:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@can_newroute={0x1c, 0x18, 0xa03, 0x0, 0x0, {}, [@CGW_SRC_IF={0x8}]}, 0x1c}}, 0x0) [ 222.823511][ T7982] IPVS: ftp: loaded support on port[0] = 21 [ 222.938306][ T7982] chnl_net:caif_netlink_parms(): no params data found [ 223.009717][ T7982] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.016935][ T7982] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.024793][ T7982] device bridge_slave_0 entered promiscuous mode [ 223.033101][ T7982] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.040506][ T7982] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.048685][ T7982] device bridge_slave_1 entered promiscuous mode [ 223.066828][ T7985] IPVS: ftp: loaded support on port[0] = 21 [ 223.068550][ T7982] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 223.083266][ T7982] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:06:38 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000080)={0x3}) ioctl(r0, 0xffffffffffffffbb, &(0x7f0000000080)) [ 223.110666][ T7982] team0: Port device team_slave_0 added [ 223.128953][ T7982] team0: Port device team_slave_1 added [ 223.229116][ T7982] device hsr_slave_0 entered promiscuous mode [ 223.276489][ T7982] device hsr_slave_1 entered promiscuous mode [ 223.369606][ T7988] IPVS: ftp: loaded support on port[0] = 21 [ 223.377073][ T7985] chnl_net:caif_netlink_parms(): no params data found 06:06:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000502d25a80648c6394fb0300fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 223.453332][ T7982] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.460457][ T7982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.467754][ T7982] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.474865][ T7982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.551569][ T7985] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.606234][ T7985] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.614143][ T7985] device bridge_slave_0 entered promiscuous mode [ 223.707580][ T7985] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.714804][ T7985] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.747040][ T7985] device bridge_slave_1 entered promiscuous mode [ 223.813406][ T7985] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 223.881083][ T7985] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 223.900844][ T7982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.941289][ T7982] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.992843][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.001281][ T2683] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.038187][ T2683] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.058000][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 224.139985][ T7985] team0: Port device team_slave_0 added [ 224.192634][ T8014] IPVS: ftp: loaded support on port[0] = 21 [ 224.215045][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 06:06:39 executing program 4: socket$inet6(0xa, 0x100000003, 0x33) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x3, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @rand_addr=0x2}}, 0x0, 0x20000000005, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00007a8000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./control\x00', 0x70) inotify_rm_watch(0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x9f) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x6}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x2, 0x80000000000000d5, [0x0]}, 0x2de) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(0x0, 0x0) fallocate(r2, 0x0, 0x40000, 0x4) [ 224.258259][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.278327][ T2683] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.285400][ T2683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.330383][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.366950][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.397785][ T2683] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.404866][ T2683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.446894][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.482774][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.518833][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.547067][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.578557][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.607347][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.647790][ T7985] team0: Port device team_slave_1 added [ 224.748344][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.768291][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.808055][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.909800][ T7985] device hsr_slave_0 entered promiscuous mode [ 224.936476][ T7985] device hsr_slave_1 entered promiscuous mode [ 224.987292][ T7985] debugfs: Directory 'hsr0' with parent '/' already present! [ 224.997155][ T7982] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 225.026378][ T7982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 225.057209][ T7988] chnl_net:caif_netlink_parms(): no params data found [ 225.067363][ T8019] IPVS: ftp: loaded support on port[0] = 21 [ 225.087160][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.095821][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 06:06:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) recvmmsg(r2, &(0x7f0000003540)=[{{0x0, 0x2be, &(0x7f0000000300)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1}}], 0x500, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 225.229886][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 225.247454][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 225.294388][ T7982] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.403530][ T7988] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.435486][ T7988] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.467260][ T7988] device bridge_slave_0 entered promiscuous mode [ 225.502932][ T8014] chnl_net:caif_netlink_parms(): no params data found [ 225.518336][ T7988] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.525501][ T7988] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.556965][ T7988] device bridge_slave_1 entered promiscuous mode [ 225.628688][ T7985] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.690225][ T7988] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.742509][ T7985] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.771802][ T8054] IPVS: ftp: loaded support on port[0] = 21 [ 225.806584][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.824600][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.858625][ T7988] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.890760][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.915309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.936166][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.943259][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.019624][ T8019] chnl_net:caif_netlink_parms(): no params data found [ 226.041038][ T8014] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.051865][ T8014] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.079871][ T8014] device bridge_slave_0 entered promiscuous mode 06:06:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000002000)) fcntl$lock(r3, 0x7, &(0x7f0000000040)={0x1, 0x0, 0x1}) fcntl$lock(r3, 0x26, &(0x7f0000000080)) fcntl$lock(r3, 0x26, &(0x7f0000000180)={0x40001}) dup3(r2, r3, 0x0) [ 226.127261][ T8014] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.134333][ T8014] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.167057][ T8014] device bridge_slave_1 entered promiscuous mode [ 226.206483][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.216682][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.253981][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.291153][ T2899] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.298289][ T2899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.326789][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.362913][ T7988] team0: Port device team_slave_0 added [ 226.413556][ T7988] team0: Port device team_slave_1 added [ 226.443093][ T8061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.502435][ T8014] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 06:06:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000002000)) fcntl$lock(r3, 0x7, &(0x7f0000000040)={0x1, 0x0, 0x1}) fcntl$lock(r3, 0x26, &(0x7f0000000080)) fcntl$lock(r3, 0x26, &(0x7f0000000180)={0x40001}) dup3(r2, r3, 0x0) [ 226.554857][ T7985] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 226.583396][ T7985] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 226.658426][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.680710][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.717085][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.725724][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.777285][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.785890][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.817224][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.825618][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.879612][ T8014] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.958393][ T7988] device hsr_slave_0 entered promiscuous mode [ 226.976698][ T7988] device hsr_slave_1 entered promiscuous mode [ 227.002195][ T8033] ================================================================== [ 227.010334][ T8033] BUG: KCSAN: data-race in pipe_wait / put_pipe_info [ 227.016989][ T8033] [ 227.019315][ T8033] read to 0xffff8880b8a5aacc of 4 bytes by task 8034 on cpu 1: [ 227.026870][ T8033] pipe_wait+0xd7/0x140 [ 227.031023][ T8033] pipe_read+0x3b1/0x5e0 [ 227.035259][ T8033] new_sync_read+0x389/0x4f0 [ 227.039842][ T8033] __vfs_read+0xb1/0xc0 [ 227.043987][ T8033] vfs_read+0x143/0x2c0 [ 227.048151][ T8033] ksys_read+0xd5/0x1b0 [ 227.052311][ T8033] __x64_sys_read+0x4c/0x60 [ 227.056812][ T8033] do_syscall_64+0xcc/0x370 [ 227.061314][ T8033] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 227.067187][ T8033] [ 227.069511][ T8033] write to 0xffff8880b8a5aacc of 4 bytes by task 8033 on cpu 0: [ 227.077134][ T8033] put_pipe_info+0x4d/0xb0 [ 227.081545][ T8033] pipe_release+0x152/0x1b0 [ 227.086040][ T8033] __fput+0x1e1/0x520 [ 227.090012][ T8033] ____fput+0x1f/0x30 [ 227.093985][ T8033] task_work_run+0xf6/0x130 [ 227.098487][ T8033] exit_to_usermode_loop+0x2b4/0x2c0 [ 227.103765][ T8033] do_syscall_64+0x353/0x370 [ 227.108352][ T8033] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 227.114225][ T8033] [ 227.116538][ T8033] Reported by Kernel Concurrency Sanitizer on: [ 227.122695][ T8033] CPU: 0 PID: 8033 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 227.129445][ T8033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.139495][ T8033] ================================================================== [ 227.147548][ T8033] Kernel panic - not syncing: panic_on_warn set ... [ 227.154130][ T8033] CPU: 0 PID: 8033 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 227.160896][ T8033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.170942][ T8033] Call Trace: [ 227.174239][ T8033] dump_stack+0xf5/0x159 [ 227.178480][ T8033] panic+0x210/0x640 [ 227.182377][ T8033] ? vprintk_func+0x8d/0x140 [ 227.186969][ T8033] kcsan_report.cold+0xc/0xe [ 227.191556][ T8033] kcsan_setup_watchpoint+0x3fe/0x410 [ 227.196926][ T8033] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 227.202734][ T8033] __tsan_unaligned_write4+0x143/0x1f0 [ 227.208203][ T8033] put_pipe_info+0x4d/0xb0 [ 227.212619][ T8033] pipe_release+0x152/0x1b0 [ 227.217123][ T8033] __fput+0x1e1/0x520 [ 227.221101][ T8033] ? put_pipe_info+0xb0/0xb0 [ 227.225692][ T8033] ____fput+0x1f/0x30 [ 227.229669][ T8033] task_work_run+0xf6/0x130 [ 227.234171][ T8033] exit_to_usermode_loop+0x2b4/0x2c0 [ 227.239457][ T8033] do_syscall_64+0x353/0x370 [ 227.244073][ T8033] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 227.249964][ T8033] RIP: 0033:0x7f992e73b2b0 [ 227.254380][ T8033] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 227.273977][ T8033] RSP: 002b:00007fff6cf876c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 227.282386][ T8033] RAX: 0000000000000000 RBX: 00007f992e9f07a0 RCX: 00007f992e73b2b0 [ 227.290351][ T8033] RDX: 00007f992e9f1df0 RSI: 0000000000000001 RDI: 0000000000000001 [ 227.298312][ T8033] RBP: 0000000000000000 R08: 00007f992ee34700 R09: 00007f992ee34700 [ 227.306275][ T8033] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 227.314237][ T8033] R13: 0000000000000001 R14: 000000000181e160 R15: 0000000000000000 [ 227.323606][ T8033] Kernel Offset: disabled [ 227.328006][ T8033] Rebooting in 86400 seconds..