[ 35.184863][ T25] audit: type=1800 audit(1572360148.273:25): pid=7020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.229969][ T25] audit: type=1800 audit(1572360148.273:26): pid=7020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 35.253083][ T25] audit: type=1800 audit(1572360148.273:27): pid=7020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 35.669537][ T7084] sshd (7084) used greatest stack depth: 10136 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.12' (ECDSA) to the list of known hosts. 2019/10/29 14:42:39 fuzzer started 2019/10/29 14:42:41 dialing manager at 10.128.0.105:40771 2019/10/29 14:42:41 syscalls: 2540 2019/10/29 14:42:41 code coverage: enabled 2019/10/29 14:42:41 comparison tracing: enabled 2019/10/29 14:42:41 extra coverage: extra coverage is not supported by the kernel 2019/10/29 14:42:41 setuid sandbox: enabled 2019/10/29 14:42:41 namespace sandbox: enabled 2019/10/29 14:42:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/29 14:42:41 fault injection: enabled 2019/10/29 14:42:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/29 14:42:41 net packet injection: enabled 2019/10/29 14:42:41 net device setup: enabled 2019/10/29 14:42:41 concurrency sanitizer: enabled syzkaller login: [ 52.603988][ T7184] KCSAN: could not find function: 'poll_schedule_timeout' 2019/10/29 14:43:02 adding functions to KCSAN blacklist: '__hrtimer_run_queues' 'pid_update_inode' 'pipe_wait' 'xas_find_marked' '__nf_conntrack_find_get' 'run_timer_softirq' 'add_timer' 'ext4_free_inodes_count' 'sit_tunnel_xmit' 'generic_fillattr' 'list_lru_add' '__ext4_new_inode' 'taskstats_exit' 'enqueue_timer' 'mm_update_next_owner' '__add_to_page_cache_locked' 'virtqueue_disable_cb' 'getboottime64' 'kcm_wait_data' 'poll_schedule_timeout' 'rcu_gp_fqs_check_wake' 'bio_endio' 'copy_process' '__find_get_block' 'tomoyo_supervisor' 'update_defense_level' 'ext4_nonda_switch' 'blk_mq_get_request' 'snapshot_refaults' 'ext4_da_write_end' 'tcp_add_backlog' 'ep_poll' 'blk_mq_sched_dispatch_requests' 'shmem_file_read_iter' 'get_signal' 'tcp_v4_rcv' '__nf_ct_refresh_acct' 'wbt_done' 'pcpu_alloc' 'tick_sched_do_timer' 'blk_mq_dispatch_rq_list' 'echo_char' 'install_new_memslots' 'ip_finish_output2' '__delete_from_page_cache' 'unix_release_sock' 'find_next_bit' 'queue_access_lock' 'dd_has_work' 'pipe_poll' 'p9_poll_workfn' 'sk_wait_data' 'yama_ptracer_del' 'ktime_get_ts64' 'kernfs_refresh_inode' 'do_nanosleep' 'find_get_pages_range_tag' '__alloc_file' 'ext4_free_inode' '__cgroup_account_cputime' 'blk_mq_run_hw_queue' 'tick_nohz_idle_stop_tick' 'ktime_get_seconds' 'icmp_global_allow' 'do_syslog' 'atime_needs_update' 'blk_mq_free_request' 'dccp_rcv_reset' 'shmem_getpage_gfp' 'n_tty_receive_buf_common' 'osq_lock' 'generic_permission' 'alloc_pid' 'vm_area_dup' 'exit_signals' 'process_srcu' '__mark_inode_dirty' 'do_readlinkat' 'commit_echoes' '__dev_queue_xmit' 'ext4_mb_good_group' 'kauditd_thread' 'mem_cgroup_protected' 'do_exit' 'page_counter_try_charge' 'tcp_poll' '__snd_rawmidi_transmit_ack' '__skb_wait_for_more_packets' 'filemap_map_pages' 'task_dump_owner' 'mod_timer' 'ext4_has_free_clusters' 'timer_clear_idle' '__skb_try_recv_from_queue' 'generic_file_read_iter' 'mem_cgroup_select_victim_node' 'ktime_get_real_seconds' 'generic_write_end' 'tick_do_update_jiffies64' 'find_group_orlov' 'ext4_mark_iloc_dirty' 'snd_ctl_notify' 'rcu_gp_fqs_loop' 'd_alloc_parallel' 14:47:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) getgid() ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) syz_open_dev$mouse(0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 330.689898][ T7188] IPVS: ftp: loaded support on port[0] = 21 14:47:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) [ 330.825929][ T7188] chnl_net:caif_netlink_parms(): no params data found [ 330.889570][ T7188] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.896898][ T7188] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.909157][ T7188] device bridge_slave_0 entered promiscuous mode [ 330.933952][ T7188] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.941370][ T7188] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.949518][ T7188] device bridge_slave_1 entered promiscuous mode [ 330.972621][ T7188] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 330.984300][ T7188] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 331.009502][ T7188] team0: Port device team_slave_0 added [ 331.014177][ T7192] IPVS: ftp: loaded support on port[0] = 21 [ 331.016624][ T7188] team0: Port device team_slave_1 added 14:47:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0063884788"], 0xfdef) [ 331.110951][ T7188] device hsr_slave_0 entered promiscuous mode [ 331.158959][ T7188] device hsr_slave_1 entered promiscuous mode [ 331.330405][ T7188] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.337614][ T7188] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.344989][ T7188] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.352086][ T7188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.649665][ T7214] IPVS: ftp: loaded support on port[0] = 21 14:47:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f00000002c0)='.yz0\xff', 0x1ff) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="17fffffffffffff7110000000100000000000000912ed9d12a7ffacc7531b8534ac8452f5e2b8dd33bb9cd1b3bf939178aa8ad30dbc5bd219a5696154a83c7ebc2350189f30c74a84e8ed38a84e338a6e85437f2ec"], 0x18}, 0x11) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) socket$kcm(0x29, 0x5, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x5, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab, 0x5}, 0x24800}, 0xffffffffffffffff, 0x1, r4, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f00000001c0)='memory.evenvs\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="56280b4a8f3d28"], 0x7) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) write$cgroup_pid(r6, &(0x7f0000000140), 0x456) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r9 = gettid() write$cgroup_pid(r8, &(0x7f0000000500)=r9, 0x12) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x7, 0x9, 0xe, 0x70, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x177, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0xb20f129af7e68836, 0x4, 0x5c, 0x1a, 0x3, 0x4, 0x554f}, r9, 0x7, 0xffffffffffffffff, 0x13) [ 331.694418][ T7188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 331.720090][ T7192] chnl_net:caif_netlink_parms(): no params data found [ 331.769014][ T7188] 8021q: adding VLAN 0 to HW filter on device team0 [ 331.781465][ T7193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.809073][ T7193] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.838946][ T7193] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.869950][ T7193] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 331.982120][ T7193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.999036][ T7193] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.006091][ T7193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.059214][ T7193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.099090][ T7193] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.106170][ T7193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.209491][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 332.230058][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 332.259926][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 332.290126][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 332.319745][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.355179][ T7192] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.368508][ T7192] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.398770][ T7192] device bridge_slave_0 entered promiscuous mode [ 332.429753][ T7192] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.436992][ T7192] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.478650][ T7192] device bridge_slave_1 entered promiscuous mode [ 332.516897][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 332.530415][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.569699][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.605889][ T7224] IPVS: ftp: loaded support on port[0] = 21 [ 332.615328][ T7188] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 332.679917][ T7188] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 332.719191][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.748672][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.796006][ T7192] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 332.861292][ T7192] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 332.923685][ T7188] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 333.003519][ T7214] chnl_net:caif_netlink_parms(): no params data found [ 333.060808][ T7192] team0: Port device team_slave_0 added 14:47:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f00000002c0)='.yz0\xff', 0x1ff) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="17fffffffffffff7110000000100000000000000912ed9d12a7ffacc7531b8534ac8452f5e2b8dd33bb9cd1b3bf939178aa8ad30db"], 0x35}, 0x11) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x5, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x667a}, 0xffffffffffffffff, 0x1, r3, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000001c0)='memory.evenvs\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="56280b4a8f3d2855"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x20000, 0x7, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x456) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r6 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500)=r6, 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x200000, 0x400000) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x7, 0x9, 0xe, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x177, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0xb20f129af7e68836, 0x4, 0x0, 0x1a, 0x3, 0x4, 0x554f}, r6, 0x7, 0xffffffffffffffff, 0x13) [ 333.118292][ T7192] team0: Port device team_slave_1 added [ 333.226211][ T7214] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.262376][ T7214] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.291476][ T7214] device bridge_slave_0 entered promiscuous mode [ 333.370959][ T7192] device hsr_slave_0 entered promiscuous mode [ 333.388147][ T7192] device hsr_slave_1 entered promiscuous mode [ 333.438063][ T7192] debugfs: Directory 'hsr0' with parent '/' already present! [ 333.445915][ T7214] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.463403][ T7214] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.519044][ T7214] device bridge_slave_1 entered promiscuous mode [ 333.548075][ C0] hrtimer: interrupt took 34822 ns [ 333.579570][ T7224] chnl_net:caif_netlink_parms(): no params data found [ 333.716019][ T7214] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 333.804459][ T7214] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 333.820539][ T7245] IPVS: ftp: loaded support on port[0] = 21 [ 333.862503][ T7224] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.927572][ T7224] bridge0: port 1(bridge_slave_0) entered disabled state 14:47:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) getgid() ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) syz_open_dev$mouse(0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 333.992710][ T7224] device bridge_slave_0 entered promiscuous mode [ 334.054460][ T7224] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.097844][ T7224] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.105966][ T7224] device bridge_slave_1 entered promiscuous mode [ 334.237470][ T7214] team0: Port device team_slave_0 added [ 334.326478][ T7214] team0: Port device team_slave_1 added [ 334.341332][ T7224] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:47:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0124fc00100002400a000000053582c137153e370900018004001700d1bd", 0x2e}], 0x1}, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000001580)='&@[\x00') [ 334.403281][ T7224] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 334.575014][ T7224] team0: Port device team_slave_0 added [ 334.599756][ T7224] team0: Port device team_slave_1 added 14:47:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) getgid() ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) syz_open_dev$mouse(0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 334.651061][ T7214] device hsr_slave_0 entered promiscuous mode [ 334.708139][ T7214] device hsr_slave_1 entered promiscuous mode [ 334.727906][ T7214] debugfs: Directory 'hsr0' with parent '/' already present! [ 334.744539][ T7192] 8021q: adding VLAN 0 to HW filter on device bond0 [ 334.906446][ T7192] 8021q: adding VLAN 0 to HW filter on device team0 [ 334.974159][ T7224] device hsr_slave_0 entered promiscuous mode [ 335.058191][ T7224] device hsr_slave_1 entered promiscuous mode [ 335.107830][ T7224] debugfs: Directory 'hsr0' with parent '/' already present! [ 335.133540][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 335.168550][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 335.325036][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 335.358884][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.418132][ T7191] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.425242][ T7191] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.521815][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 335.571570][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.628202][ T7191] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.635315][ T7191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.724578][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 335.779155][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 335.849059][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 335.898583][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 335.983770][ T7192] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 336.000967][ T7281] IPVS: ftp: loaded support on port[0] = 21 [ 336.052738][ T7192] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 336.146497][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.175040][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 336.215997][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 336.268786][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 336.311750][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.350297][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.394809][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 336.437701][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.492095][ T7245] chnl_net:caif_netlink_parms(): no params data found [ 336.580694][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 336.661236][ T7192] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 336.752226][ T7214] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.887118][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.911852][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.962325][ T7214] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.991391][ T7245] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.022249][ T7245] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.062669][ T7245] device bridge_slave_0 entered promiscuous mode [ 337.152577][ T7224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.196396][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.212254][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.261354][ T7191] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.268467][ T7191] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.325186][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.352610][ T7191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.388512][ T7191] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.395623][ T7191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.453717][ T7245] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.464179][ T7245] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.495100][ T7245] device bridge_slave_1 entered promiscuous mode [ 337.543685][ T7224] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.568887][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.587641][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.624088][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.644255][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.676874][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.709557][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.738883][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.772931][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 337.789064][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.841513][ T7214] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 337.873183][ T7214] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 337.895395][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.909161][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.930273][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.939456][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.948320][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.956771][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.966062][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.974824][ T3498] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.981906][ T3498] bridge0: port 1(bridge_slave_0) entered forwarding state 14:47:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) getgid() ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) syz_open_dev$mouse(0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 337.990602][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.999888][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.008349][ T3498] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.015423][ T3498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.023667][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 338.033517][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 338.067547][ T7214] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 338.079216][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 338.091468][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.108444][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 338.127428][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 338.142132][ T7292] ================================================================== [ 338.150233][ T7292] BUG: KCSAN: data-race in get_task_cred / get_task_cred [ 338.157242][ T7292] [ 338.159572][ T7292] write to 0xffff88812adf6b18 of 4 bytes by task 7314 on cpu 0: [ 338.167198][ T7292] get_task_cred+0xd2/0x120 [ 338.171701][ T7292] proc_pid_status+0x17c/0x1000 [ 338.176545][ T7292] proc_single_show+0x89/0xe0 [ 338.181216][ T7292] seq_read+0x350/0x960 [ 338.185369][ T7292] __vfs_read+0x67/0xc0 [ 338.189521][ T7292] vfs_read+0x143/0x2c0 [ 338.193691][ T7292] ksys_read+0xd5/0x1b0 [ 338.197849][ T7292] __x64_sys_read+0x4c/0x60 [ 338.202351][ T7292] do_syscall_64+0xcc/0x370 [ 338.206851][ T7292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 338.212734][ T7292] [ 338.215056][ T7292] write to 0xffff88812adf6b18 of 4 bytes by task 7292 on cpu 1: [ 338.222702][ T7292] get_task_cred+0xd2/0x120 [ 338.227203][ T7292] proc_pid_status+0x17c/0x1000 [ 338.232055][ T7292] proc_single_show+0x89/0xe0 [ 338.236726][ T7292] seq_read+0x350/0x960 [ 338.240880][ T7292] __vfs_read+0x67/0xc0 [ 338.245032][ T7292] vfs_read+0x143/0x2c0 [ 338.249187][ T7292] ksys_read+0xd5/0x1b0 [ 338.253336][ T7292] __x64_sys_read+0x4c/0x60 [ 338.257944][ T7292] do_syscall_64+0xcc/0x370 [ 338.262443][ T7292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 338.268316][ T7292] [ 338.270630][ T7292] Reported by Kernel Concurrency Sanitizer on: [ 338.276797][ T7292] CPU: 1 PID: 7292 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 338.283542][ T7292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.293591][ T7292] ================================================================== [ 338.301730][ T7292] Kernel panic - not syncing: panic_on_warn set ... [ 338.308312][ T7292] CPU: 1 PID: 7292 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 338.315066][ T7292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.325113][ T7292] Call Trace: [ 338.328400][ T7292] dump_stack+0xf5/0x159 [ 338.332652][ T7292] panic+0x210/0x640 [ 338.336725][ T7292] ? do_syscall_64+0xcc/0x370 [ 338.341391][ T7292] ? vprintk_func+0x8d/0x140 [ 338.345977][ T7292] kcsan_report.cold+0xc/0x10 [ 338.350650][ T7292] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 338.356194][ T7292] __tsan_write4+0x32/0x40 [ 338.360631][ T7292] get_task_cred+0xd2/0x120 [ 338.365138][ T7292] proc_pid_status+0x17c/0x1000 [ 338.369993][ T7292] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 338.375624][ T7292] proc_single_show+0x89/0xe0 [ 338.380387][ T7292] seq_read+0x350/0x960 [ 338.384548][ T7292] __vfs_read+0x67/0xc0 [ 338.388701][ T7292] ? seq_hlist_start_head_rcu+0x60/0x60 [ 338.394246][ T7292] vfs_read+0x143/0x2c0 [ 338.398397][ T7292] ksys_read+0xd5/0x1b0 [ 338.402550][ T7292] __x64_sys_read+0x4c/0x60 [ 338.407048][ T7292] do_syscall_64+0xcc/0x370 [ 338.411550][ T7292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 338.417440][ T7292] RIP: 0033:0x7fbd1df90310 [ 338.421860][ T7292] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 338.441640][ T7292] RSP: 002b:00007ffe43427848 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 338.450052][ T7292] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007fbd1df90310 [ 338.458039][ T7292] RDX: 0000000000000fff RSI: 00007fbd1e45dd00 RDI: 0000000000000006 [ 338.466103][ T7292] RBP: 0000000000000fff R08: 0000000000000000 R09: 00007fbd1e25857b [ 338.474069][ T7292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbd1e45dd00 [ 338.482037][ T7292] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 338.491300][ T7292] Kernel Offset: disabled [ 338.495624][ T7292] Rebooting in 86400 seconds..