[ 51.476106][ T26] audit: type=1800 audit(1573243213.101:26): pid=7894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 51.504510][ T26] audit: type=1800 audit(1573243213.101:27): pid=7894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.536066][ T26] audit: type=1800 audit(1573243213.101:28): pid=7894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.193244][ T26] audit: type=1800 audit(1573243213.851:29): pid=7894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.83' (ECDSA) to the list of known hosts. 2019/11/08 20:00:22 fuzzer started 2019/11/08 20:00:24 dialing manager at 10.128.0.105:41185 2019/11/08 20:00:24 syscalls: 2553 2019/11/08 20:00:24 code coverage: enabled 2019/11/08 20:00:24 comparison tracing: enabled 2019/11/08 20:00:24 extra coverage: extra coverage is not supported by the kernel 2019/11/08 20:00:24 setuid sandbox: enabled 2019/11/08 20:00:24 namespace sandbox: enabled 2019/11/08 20:00:24 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/08 20:00:24 fault injection: enabled 2019/11/08 20:00:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/08 20:00:24 net packet injection: enabled 2019/11/08 20:00:24 net device setup: enabled 2019/11/08 20:00:24 concurrency sanitizer: enabled 2019/11/08 20:00:24 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 74.485621][ T8059] KCSAN: could not find function: 'calc_wb_limits' [ 75.786810][ T8059] KCSAN: could not find function: 'poll_schedule_timeout' [ 79.922139][ T8059] KCSAN: could not find function: 'may_open' 2019/11/08 20:00:42 adding functions to KCSAN blacklist: 'echo_char' 'ima_file_free' 'rcu_gp_fqs_check_wake' 'padata_find_next' 'sctp_association_free' 'dd_has_work' '__d_lookup_done' 'pipe_unlock' '__dev_queue_xmit' 'do_exit' 'blk_mq_dispatch_rq_list' 'p9_poll_workfn' 'timer_clear_idle' 'audit_log_start' 'd_lru_del' 'ext4_nonda_switch' 'xas_clear_mark' 'enqueue_timer' 'blk_mq_get_request' 'inactive_list_is_low' '__hrtimer_run_queues' 'common_perm_cond' 'inet_putpeer' 'wbc_attach_and_unlock_inode' 'pipe_poll' 'add_timer' 'tick_nohz_idle_stop_tick' 'tomoyo_supervisor' 'ep_poll' 'fanout_demux_rollover' 'osq_lock' 'rcu_gp_fqs_loop' 'ipip_tunnel_xmit' '__tcp_transmit_skb' 'xas_find_marked' '__snd_rawmidi_transmit_ack' 'list_lru_count_one' 'ktime_get_real_seconds' 'ext4_mb_good_group' 'wbc_detach_inode' 'fsnotify' 'hrtimer_wakeup' 'tick_sched_do_timer' '__ip6_datagram_connect' 'evict' 'do_syslog' 'blk_stat_add' 'do_nanosleep' 'lruvec_lru_size' 'sit_tunnel_xmit' 'atime_needs_update' 'mm_update_next_owner' 'ext4_mark_iloc_dirty' 'tick_do_update_jiffies64' 'wbt_done' 'kcm_rfree' 'kvm_arch_vcpu_load' '__change_pid' 'calc_wb_limits' '__ext4_new_inode' 'ktime_get_seconds' 'task_dump_owner' 'snd_seq_check_queue' 'do_dentry_open' 'poll_schedule_timeout' 'mem_cgroup_select_victim_node' 'ext4_da_write_end' 'ext4_has_free_clusters' 'kauditd_thread' 'run_timer_softirq' 'find_get_pages_range_tag' 'ext4_free_inodes_count' 'pid_update_inode' 'n_tty_receive_buf_common' '__perf_event_overflow' 'find_next_bit' '__alloc_file' 'generic_permission' 'tcp_add_backlog' 'pcpu_alloc' 'copy_process' 'vm_area_dup' 'shmem_file_read_iter' 'wbt_issue' 'shrink_node' 'virtqueue_disable_cb' '__ext4_abort' 'exit_signals' 'mod_timer' 'futex_wait_queue_me' 'add_timer_on' 'snd_seq_prioq_cell_out' 'inode_sync_complete' 'generic_write_end' 'ext4_free_inode' '__inode_add_bytes' 'writeback_sb_inodes' 'may_open' 'taskstats_exit' 'blk_mq_sched_dispatch_requests' 'queue_access_lock' 'snapshot_refaults' '__add_to_page_cache_locked' 'pipe_wait' 'blk_mq_run_hw_queue' 'generic_fillattr' '__remove_hrtimer' 'process_srcu' 'page_counter_try_charge' 20:04:40 executing program 0: 20:04:40 executing program 1: [ 319.293304][ T8064] IPVS: ftp: loaded support on port[0] = 21 [ 319.437233][ T8064] chnl_net:caif_netlink_parms(): no params data found [ 319.502981][ T8064] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.511103][ T8064] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.519482][ T8064] device bridge_slave_0 entered promiscuous mode [ 319.527991][ T8064] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.535181][ T8064] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.543418][ T8064] device bridge_slave_1 entered promiscuous mode 20:04:41 executing program 2: [ 319.562038][ T8067] IPVS: ftp: loaded support on port[0] = 21 [ 319.573642][ T8064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 319.587486][ T8064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.640628][ T8064] team0: Port device team_slave_0 added [ 319.659650][ T8064] team0: Port device team_slave_1 added [ 319.748767][ T8064] device hsr_slave_0 entered promiscuous mode 20:04:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = epoll_create1(0x0) r4 = epoll_create1(0x0) r5 = fcntl$dupfd(r4, 0x0, r4) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000d36ff4)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r6, &(0x7f00000000c0)) [ 319.806334][ T8064] device hsr_slave_1 entered promiscuous mode [ 319.881797][ T8070] IPVS: ftp: loaded support on port[0] = 21 [ 319.991531][ T8064] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.998667][ T8064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.006016][ T8064] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.013052][ T8064] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.112244][ T8067] chnl_net:caif_netlink_parms(): no params data found [ 320.221353][ T8064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.286548][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.306240][ T8085] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.337870][ T8085] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.378189][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 320.400874][ T8064] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.430601][ T8067] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.457861][ T8067] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.477418][ T8067] device bridge_slave_0 entered promiscuous mode [ 320.512233][ T8099] IPVS: ftp: loaded support on port[0] = 21 [ 320.532019][ T8070] chnl_net:caif_netlink_parms(): no params data found [ 320.564173][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.577989][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.606465][ T8094] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.613532][ T8094] bridge0: port 1(bridge_slave_0) entered forwarding state 20:04:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000900)='/dev/dmmidi#\x00', 0x2, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x2000010200000f) [ 320.658011][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.678036][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.737805][ T8094] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.744877][ T8094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.777933][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.846072][ T8067] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.853147][ T8067] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.886083][ T8067] device bridge_slave_1 entered promiscuous mode [ 320.913121][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.939445][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.987479][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.018262][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.058256][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 321.098754][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.137950][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.167141][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.197875][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.219921][ T8064] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 321.270633][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 321.294067][ T8103] IPVS: ftp: loaded support on port[0] = 21 [ 321.325093][ T8067] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 20:04:43 executing program 5: syz_open_dev$dmmidi(&(0x7f0000000900)='/dev/dmmidi#\x00', 0x2, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x2000010200000f) [ 321.416356][ T8067] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 321.436850][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 321.444279][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 321.494901][ T8070] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.504077][ T8070] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.536400][ T8070] device bridge_slave_0 entered promiscuous mode [ 321.558875][ T8064] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.609952][ T8067] team0: Port device team_slave_0 added [ 321.623348][ T8070] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.630562][ T8070] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.651385][ T8070] device bridge_slave_1 entered promiscuous mode [ 321.693844][ T8067] team0: Port device team_slave_1 added [ 321.764140][ T8070] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 321.775518][ T8070] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 321.828618][ T8067] device hsr_slave_0 entered promiscuous mode [ 321.866422][ T8067] device hsr_slave_1 entered promiscuous mode [ 321.926055][ T8067] debugfs: Directory 'hsr0' with parent '/' already present! [ 321.948622][ T8114] IPVS: ftp: loaded support on port[0] = 21 [ 321.954220][ T8099] chnl_net:caif_netlink_parms(): no params data found [ 322.058491][ T8070] team0: Port device team_slave_0 added [ 322.108854][ T8070] team0: Port device team_slave_1 added 20:04:43 executing program 0: [ 322.218795][ T8103] chnl_net:caif_netlink_parms(): no params data found [ 322.275019][ T8067] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.339480][ T8099] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.356544][ T8099] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.364331][ T8099] device bridge_slave_0 entered promiscuous mode 20:04:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) socket$inet(0x10, 0xa, 0x0) [ 322.421524][ T8070] device hsr_slave_0 entered promiscuous mode [ 322.479909][ T8070] device hsr_slave_1 entered promiscuous mode [ 322.516119][ T8070] debugfs: Directory 'hsr0' with parent '/' already present! [ 322.535112][ T8067] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.562234][ T8099] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.575291][ T8099] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.593321][ T8099] device bridge_slave_1 entered promiscuous mode [ 322.658490][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.675125][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.768861][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.788455][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 20:04:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="085fb57043201f", 0x7, 0x9d}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) [ 322.826530][ T8085] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.833602][ T8085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.889478][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.947943][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.961603][ T8085] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.968709][ T8085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.012813][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 323.130504][ T8099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 323.173992][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.249830][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 323.279562][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 323.300528][ T8156] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 323.358435][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 323.367375][ T8156] EXT4-fs (loop0): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 323.387304][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 323.428032][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 323.472321][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 323.514004][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.567897][ T8030] ================================================================== [ 323.572154][ T8067] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 323.576058][ T8030] BUG: KCSAN: data-race in kernfs_fop_open / kernfs_refresh_inode [ 323.576074][ T8030] [ 323.596614][ T8030] write to 0xffff8880ba08f490 of 2 bytes by task 3888 on cpu 1: [ 323.604261][ T8030] kernfs_refresh_inode+0x42/0x140 [ 323.609386][ T8030] kernfs_iop_getattr+0x68/0x90 [ 323.614239][ T8030] vfs_getattr_nosec+0x12e/0x170 [ 323.619178][ T8030] vfs_getattr+0x54/0x70 [ 323.620291][ T8067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 323.623431][ T8030] vfs_statx+0x102/0x190 [ 323.623458][ T8030] __do_sys_newstat+0x51/0xb0 [ 323.639436][ T8030] __x64_sys_newstat+0x3a/0x50 [ 323.644202][ T8030] do_syscall_64+0xcc/0x370 [ 323.648711][ T8030] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 323.654592][ T8030] [ 323.656925][ T8030] read to 0xffff8880ba08f490 of 2 bytes by task 8030 on cpu 0: [ 323.664488][ T8030] kernfs_fop_open+0x1ad/0x7f0 [ 323.669267][ T8030] do_dentry_open+0x2f4/0x8f0 [ 323.673948][ T8030] vfs_open+0x62/0x80 [ 323.677948][ T8030] path_openat+0xf73/0x36e0 [ 323.682477][ T8030] do_filp_open+0x11e/0x1b0 [ 323.686987][ T8030] do_sys_open+0x3b3/0x4f0 [ 323.691414][ T8030] __x64_sys_open+0x55/0x70 [ 323.692356][ T8103] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.695934][ T8030] do_syscall_64+0xcc/0x370 [ 323.707456][ T8030] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 323.713338][ T8030] [ 323.715665][ T8030] Reported by Kernel Concurrency Sanitizer on: [ 323.721826][ T8030] CPU: 0 PID: 8030 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 323.723927][ T8103] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.728836][ T8030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.728845][ T8030] ================================================================== [ 323.728856][ T8030] Kernel panic - not syncing: panic_on_warn set ... [ 323.728877][ T8030] CPU: 0 PID: 8030 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 323.728888][ T8030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.728893][ T8030] Call Trace: [ 323.728931][ T8030] dump_stack+0xf5/0x159 [ 323.777497][ T8103] device bridge_slave_0 entered promiscuous mode [ 323.777668][ T8030] panic+0x210/0x640 [ 323.791205][ T8099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.791506][ T8030] ? vprintk_func+0x8d/0x140 [ 323.808974][ T8030] kcsan_report.cold+0xc/0xe [ 323.813588][ T8030] kcsan_setup_watchpoint+0x3fe/0x410 [ 323.818978][ T8030] __tsan_read2+0x145/0x1f0 [ 323.823498][ T8030] kernfs_fop_open+0x1ad/0x7f0 [ 323.828285][ T8030] ? security_file_open+0x84/0x210 [ 323.833426][ T8030] do_dentry_open+0x2f4/0x8f0 [ 323.838113][ T8030] ? security_inode_permission+0xa5/0xc0 [ 323.843759][ T8030] ? kernfs_fop_release+0x160/0x160 [ 323.848972][ T8030] vfs_open+0x62/0x80 [ 323.852988][ T8030] path_openat+0xf73/0x36e0 [ 323.857527][ T8030] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 323.863423][ T8030] ? __read_once_size+0x41/0xe0 [ 323.868293][ T8030] do_filp_open+0x11e/0x1b0 [ 323.872819][ T8030] ? __alloc_fd+0x2ef/0x3b0 [ 323.877353][ T8030] do_sys_open+0x3b3/0x4f0 [ 323.881790][ T8030] __x64_sys_open+0x55/0x70 [ 323.886322][ T8030] do_syscall_64+0xcc/0x370 [ 323.890847][ T8030] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 323.896742][ T8030] RIP: 0033:0x7fb72b485120 [ 323.901176][ T8030] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 323.920781][ T8030] RSP: 002b:00007fffad6a75c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 323.929207][ T8030] RAX: ffffffffffffffda RBX: 0000000002466e80 RCX: 00007fb72b485120 [ 323.937211][ T8030] RDX: 00000000000001b6 RSI: 0000000000080000 RDI: 00007fffad6a76a0 [ 323.945270][ T8030] RBP: 00007fffad6a7640 R08: 0000000000000008 R09: 0000000000000001 [ 323.953248][ T8030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 323.961247][ T8030] R13: 000000000041f57a R14: 000000000244e250 R15: 000000000000000b [ 323.970685][ T8030] Kernel Offset: disabled [ 323.975018][ T8030] Rebooting in 86400 seconds..