[ 50.253086][ T26] audit: type=1800 audit(1572955757.163:27): pid=7838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 50.275222][ T26] audit: type=1800 audit(1572955757.173:28): pid=7838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 50.763737][ T26] audit: type=1800 audit(1572955757.773:29): pid=7838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 50.785838][ T26] audit: type=1800 audit(1572955757.773:30): pid=7838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2019/11/05 12:09:25 fuzzer started 2019/11/05 12:09:25 dialing manager at 10.128.0.105:39277 2019/11/05 12:09:26 syscalls: 2553 2019/11/05 12:09:26 code coverage: enabled 2019/11/05 12:09:26 comparison tracing: enabled 2019/11/05 12:09:26 extra coverage: extra coverage is not supported by the kernel 2019/11/05 12:09:26 setuid sandbox: enabled 2019/11/05 12:09:26 namespace sandbox: enabled 2019/11/05 12:09:26 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 12:09:26 fault injection: enabled 2019/11/05 12:09:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 12:09:26 net packet injection: enabled 2019/11/05 12:09:26 net device setup: enabled 2019/11/05 12:09:26 concurrency sanitizer: enabled 2019/11/05 12:09:26 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/05 12:09:26 adding functions to KCSAN blacklist: '__hrtimer_run_queues' 'find_next_bit' 'ep_insert' 'ep_poll' 12:09:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="6ccd47b4a9f81be51b85c8c1000037d0"}}, 0x0, 0x80, 0x0, "270a2274179f9507646ca996fa9cce10cce4e0886d9501f11684b86b43044738a761c09cfc08add7d9ef4d2e949aee8d8a116d1f298976a1fce507407676d0a7172416ad721df78b00"}, 0xd8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x27) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 12:09:28 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0x2, "c4ed20bc6781718b22861dc347d57a68ad8a73374dc3ec46a1d18bb651a11265"}) syzkaller login: [ 61.711396][ T8007] IPVS: ftp: loaded support on port[0] = 21 [ 61.805500][ T8007] chnl_net:caif_netlink_parms(): no params data found [ 61.844383][ T8010] IPVS: ftp: loaded support on port[0] = 21 [ 61.862681][ T8007] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.871659][ T8007] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.879907][ T8007] device bridge_slave_0 entered promiscuous mode [ 61.897030][ T8007] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.904889][ T8007] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.912696][ T8007] device bridge_slave_1 entered promiscuous mode 12:09:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000140)={0x18}, 0x36d) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x8, 0x6}, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x1a000080, 0x0, 0x0, 0x0) [ 61.955116][ T8007] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.977931][ T8007] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.032599][ T8007] team0: Port device team_slave_0 added [ 62.052869][ T8010] chnl_net:caif_netlink_parms(): no params data found [ 62.073057][ T8007] team0: Port device team_slave_1 added [ 62.145965][ T8007] device hsr_slave_0 entered promiscuous mode [ 62.183873][ T8007] device hsr_slave_1 entered promiscuous mode 12:09:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x1ff, 0x100) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(0x0, r1, &(0x7f00000000c0)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x309, r3) keyctl$read(0xb, r4, &(0x7f0000005340)=""/4096, 0xffffffffffffffc2) [ 62.288649][ T8013] IPVS: ftp: loaded support on port[0] = 21 [ 62.354927][ T8010] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.365058][ T8010] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.390219][ T8010] device bridge_slave_0 entered promiscuous mode [ 62.435559][ T8010] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.442636][ T8010] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.475479][ T8010] device bridge_slave_1 entered promiscuous mode [ 62.545639][ T8007] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.552710][ T8007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.560245][ T8007] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.567318][ T8007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.622111][ T8010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.676957][ T8010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.711112][ T8036] IPVS: ftp: loaded support on port[0] = 21 [ 62.784690][ T8007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.802990][ T8010] team0: Port device team_slave_0 added [ 62.828285][ T8010] team0: Port device team_slave_1 added [ 62.845795][ T3502] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.884047][ T3502] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.924760][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 62.970672][ T8013] chnl_net:caif_netlink_parms(): no params data found 12:09:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f00000028c0), 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/wireless\x00') sendfile(r4, r5, 0x0, 0x320f) [ 63.030369][ T8007] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.050140][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.066219][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.116023][ T8010] device hsr_slave_0 entered promiscuous mode [ 63.166498][ T8010] device hsr_slave_1 entered promiscuous mode [ 63.223554][ T8010] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.257188][ T2974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.284165][ T2974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.314002][ T2974] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.321099][ T2974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.384028][ T2974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.424049][ T2974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.465704][ T2974] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.472988][ T2974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.524149][ T2974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.554754][ T2974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.639109][ T8043] IPVS: ftp: loaded support on port[0] = 21 [ 63.648468][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.666801][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.698970][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.734256][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.774796][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.821378][ T8007] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 63.863575][ T8007] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 63.943342][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.960667][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.012348][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.075178][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.153646][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 12:09:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x4b564d02, 0x3]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 64.275049][ T8013] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.282191][ T8013] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.345638][ T8013] device bridge_slave_0 entered promiscuous mode [ 64.447166][ T8013] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.473635][ T8013] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.514272][ T8013] device bridge_slave_1 entered promiscuous mode [ 64.538177][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 64.565724][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 64.604863][ T8036] chnl_net:caif_netlink_parms(): no params data found [ 64.727718][ T8007] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.775039][ T8013] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.811354][ T8010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.844868][ T8036] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.851936][ T8036] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.887776][ T8036] device bridge_slave_0 entered promiscuous mode [ 64.915380][ T8036] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.922512][ T8036] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.954625][ T8036] device bridge_slave_1 entered promiscuous mode [ 64.976189][ T8013] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.042810][ T8010] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.065116][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.073248][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.139994][ T8036] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.155944][ T8077] IPVS: ftp: loaded support on port[0] = 21 [ 65.205233][ T8036] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.226325][ T8043] chnl_net:caif_netlink_parms(): no params data found [ 65.280977][ T8013] team0: Port device team_slave_0 added [ 65.346381][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.374680][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.383972][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.391071][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.444241][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.464291][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.507131][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.514227][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.577770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.597780][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.618265][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.637207][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.667163][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.684718][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.720073][ T8013] team0: Port device team_slave_1 added [ 65.762951][ T8036] team0: Port device team_slave_0 added [ 65.782804][ T8010] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 65.794410][ T8010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 65.810038][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.824193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.842238][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.862709][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.871944][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.884650][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.906855][ T8036] team0: Port device team_slave_1 added [ 65.976271][ T8013] device hsr_slave_0 entered promiscuous mode [ 66.023873][ T8013] device hsr_slave_1 entered promiscuous mode [ 66.063672][ T8013] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.076173][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.084452][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.091868][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.176093][ T8036] device hsr_slave_0 entered promiscuous mode [ 66.213861][ T8036] device hsr_slave_1 entered promiscuous mode [ 66.273593][ T8036] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.282926][ T8010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.296534][ T8043] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.303689][ T8043] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.311614][ T8043] device bridge_slave_0 entered promiscuous mode [ 66.348488][ T8043] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.356245][ T8043] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.375771][ T8043] device bridge_slave_1 entered promiscuous mode [ 66.530750][ T8043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.609738][ T8077] chnl_net:caif_netlink_parms(): no params data found [ 66.681737][ T8043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.871313][ T8043] team0: Port device team_slave_0 added [ 66.924222][ T8043] team0: Port device team_slave_1 added [ 67.062318][ T8077] bridge0: port 1(bridge_slave_0) entered blocking state 12:09:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0x2, "c4ed20bc6781718b22861dc347d57a68ad8a73374dc3ec46a1d18bb651a11265"}) [ 67.102892][ T8077] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.145297][ T8077] device bridge_slave_0 entered promiscuous mode [ 67.274083][ T8036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.321667][ T8077] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.335567][ T8077] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.428163][ T8077] device bridge_slave_1 entered promiscuous mode 12:09:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0x2, "c4ed20bc6781718b22861dc347d57a68ad8a73374dc3ec46a1d18bb651a11265"}) [ 67.526127][ T8043] device hsr_slave_0 entered promiscuous mode [ 67.563898][ T8043] device hsr_slave_1 entered promiscuous mode [ 67.643599][ T8043] debugfs: Directory 'hsr0' with parent '/' already present! [ 67.654519][ T8013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.683966][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.691992][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.755227][ T8036] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.814777][ T8013] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.839593][ T8077] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.881037][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.899920][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:09:35 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0x2, "c4ed20bc6781718b22861dc347d57a68ad8a73374dc3ec46a1d18bb651a11265"}) [ 67.993397][ T8077] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.111909][ T8013] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 68.272718][ T8013] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.495092][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.527248][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 12:09:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="6ccd47b4a9f81be51b85c8c1000037d0"}}, 0x0, 0x80, 0x0, "270a2274179f9507646ca996fa9cce10cce4e0886d9501f11684b86b43044738a761c09cfc08add7d9ef4d2e949aee8d8a116d1f298976a1fce507407676d0a7172416ad721df78b00"}, 0xd8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x27) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 68.578027][ T8039] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.585160][ T8039] bridge0: port 1(bridge_slave_0) entered forwarding state 12:09:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="6ccd47b4a9f81be51b85c8c1000037d0"}}, 0x0, 0x80, 0x0, "270a2274179f9507646ca996fa9cce10cce4e0886d9501f11684b86b43044738a761c09cfc08add7d9ef4d2e949aee8d8a116d1f298976a1fce507407676d0a7172416ad721df78b00"}, 0xd8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x27) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 68.755044][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.823966][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.832407][ T8039] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.839508][ T8039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.007708][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.097465][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.173999][ T8039] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.181074][ T8039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.256707][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.308176][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.382811][ T8039] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.389938][ T8039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.480649][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.538583][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.598693][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.668250][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.742190][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.818435][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.884394][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.969971][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.030549][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.106357][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.170956][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.259062][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.322464][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.385336][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.452284][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.516994][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.577790][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.629823][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.675364][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.718917][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.790441][ T8036] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.828337][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.852093][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.894995][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.934750][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.961659][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.997921][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.019417][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.042998][ T8013] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.076242][ T8077] team0: Port device team_slave_0 added [ 71.082163][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.095019][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.121188][ T8036] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.139706][ T8077] team0: Port device team_slave_1 added [ 71.212069][ T8043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.277947][ T8077] device hsr_slave_0 entered promiscuous mode [ 71.335602][ T8077] device hsr_slave_1 entered promiscuous mode [ 71.355442][ T8077] debugfs: Directory 'hsr0' with parent '/' already present! [ 71.380395][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.397298][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.413398][ T8043] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.496992][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.527555][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.579231][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.586363][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.609437][ C1] hrtimer: interrupt took 39424 ns [ 71.635750][ T8223] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 71.688099][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.716673][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.789846][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.863994][ T8044] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.871067][ T8044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.929400][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.964346][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.025363][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.054431][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.089994][ T8043] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 72.161309][ T8043] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 72.220859][ T8077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.238261][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.258921][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.281757][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.315781][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.346933][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.375847][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.406633][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.420416][ T8239] ================================================================== [ 72.428559][ T8239] BUG: KCSAN: data-race in task_dump_owner / task_dump_owner [ 72.435926][ T8239] [ 72.438259][ T8239] write to 0xffff8881248dd08c of 4 bytes by task 8247 on cpu 1: [ 72.445898][ T8239] task_dump_owner+0x237/0x260 [ 72.450679][ T8239] pid_update_inode+0x3c/0x70 [ 72.455370][ T8239] pid_revalidate+0x91/0xd0 [ 72.459892][ T8239] lookup_fast+0x618/0x700 [ 72.464349][ T8239] path_openat+0x2ac/0x36e0 [ 72.468866][ T8239] do_filp_open+0x11e/0x1b0 [ 72.473388][ T8239] do_sys_open+0x3b3/0x4f0 [ 72.477810][ T8239] __x64_sys_open+0x55/0x70 [ 72.482335][ T8239] do_syscall_64+0xcc/0x370 [ 72.486854][ T8239] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.492734][ T8239] [ 72.495248][ T8239] write to 0xffff8881248dd08c of 4 bytes by task 8239 on cpu 0: [ 72.502892][ T8239] task_dump_owner+0x237/0x260 [ 72.507670][ T8239] pid_update_inode+0x3c/0x70 [ 72.512360][ T8239] pid_revalidate+0x91/0xd0 [ 72.516880][ T8239] lookup_fast+0x618/0x700 [ 72.521315][ T8239] path_openat+0x2ac/0x36e0 [ 72.525831][ T8239] do_filp_open+0x11e/0x1b0 [ 72.530347][ T8239] do_sys_open+0x3b3/0x4f0 [ 72.534779][ T8239] __x64_sys_open+0x55/0x70 [ 72.539304][ T8239] do_syscall_64+0xcc/0x370 [ 72.543819][ T8239] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.549703][ T8239] [ 72.552030][ T8239] Reported by Kernel Concurrency Sanitizer on: [ 72.558188][ T8239] CPU: 0 PID: 8239 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 72.564949][ T8239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.575010][ T8239] ================================================================== [ 72.583080][ T8239] Kernel panic - not syncing: panic_on_warn set ... [ 72.589681][ T8239] CPU: 0 PID: 8239 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 72.596444][ T8239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.606498][ T8239] Call Trace: [ 72.609817][ T8239] dump_stack+0xf5/0x159 [ 72.614070][ T8239] panic+0x210/0x640 [ 72.617981][ T8239] ? vprintk_func+0x8d/0x140 [ 72.622602][ T8239] kcsan_report.cold+0xc/0xe [ 72.627217][ T8239] kcsan_setup_watchpoint+0x3fe/0x410 [ 72.632612][ T8239] ? __read_once_size.constprop.0+0x12/0x20 [ 72.638528][ T8239] __tsan_unaligned_write4+0x143/0x1f0 [ 72.644012][ T8239] task_dump_owner+0x237/0x260 [ 72.648797][ T8239] ? __rcu_read_unlock+0x66/0x3c0 [ 72.653847][ T8239] pid_update_inode+0x3c/0x70 [ 72.658545][ T8239] pid_revalidate+0x91/0xd0 [ 72.663071][ T8239] lookup_fast+0x618/0x700 [ 72.667519][ T8239] path_openat+0x2ac/0x36e0 [ 72.672039][ T8239] ? proc_pid_status+0xee1/0x1000 [ 72.677092][ T8239] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 72.683359][ T8239] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 72.689274][ T8239] ? __read_once_size+0x41/0xe0 [ 72.694150][ T8239] do_filp_open+0x11e/0x1b0 [ 72.698682][ T8239] ? __alloc_fd+0x2ef/0x3b0 [ 72.703207][ T8239] do_sys_open+0x3b3/0x4f0 [ 72.707651][ T8239] __x64_sys_open+0x55/0x70 [ 72.712181][ T8239] do_syscall_64+0xcc/0x370 [ 72.716703][ T8239] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.722616][ T8239] RIP: 0033:0x7f0a61bf9120 [ 72.727053][ T8239] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 72.746668][ T8239] RSP: 002b:00007ffdfa8b7ea8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 72.755088][ T8239] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f0a61bf9120 [ 72.763064][ T8239] RDX: 00007ffdfa8b7ee2 RSI: 0000000000000000 RDI: 00007ffdfa8b7ed0 [ 72.771045][ T8239] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007f0a61ec155f [ 72.779023][ T8239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000002121220 [ 72.787005][ T8239] R13: 0000000000000020 R14: 00007f0a622ae010 R15: 0000000000000000 [ 72.796383][ T8239] Kernel Offset: disabled [ 72.800779][ T8239] Rebooting in 86400 seconds..