[ 51.927368][ T25] audit: type=1800 audit(1573006844.624:26): pid=7969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 51.971999][ T25] audit: type=1800 audit(1573006844.634:27): pid=7969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.998732][ T25] audit: type=1800 audit(1573006844.634:28): pid=7969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.861282][ T25] audit: type=1800 audit(1573006845.584:29): pid=7969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.6' (ECDSA) to the list of known hosts. 2019/11/06 02:20:54 fuzzer started 2019/11/06 02:20:56 dialing manager at 10.128.0.105:39303 2019/11/06 02:20:56 checking machine... 2019/11/06 02:20:56 checking revisions... 2019/11/06 02:20:56 testing simple program... syzkaller login: [ 64.129748][ T8136] IPVS: ftp: loaded support on port[0] = 21 2019/11/06 02:20:56 building call list... executing program [ 67.277528][ T8142] can: request_module (can-proto-0) failed. [ 67.289807][ T8142] can: request_module (can-proto-0) failed. [ 67.301180][ T8142] can: request_module (can-proto-7) failed. [ 67.313269][ T8142] can: request_module (can-proto-0) failed. 2019/11/06 02:21:03 syscalls: 2553 2019/11/06 02:21:03 code coverage: enabled 2019/11/06 02:21:03 comparison tracing: enabled 2019/11/06 02:21:03 extra coverage: extra coverage is not supported by the kernel 2019/11/06 02:21:03 setuid sandbox: enabled 2019/11/06 02:21:03 namespace sandbox: enabled 2019/11/06 02:21:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 02:21:03 fault injection: enabled 2019/11/06 02:21:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 02:21:03 net packet injection: enabled 2019/11/06 02:21:03 net device setup: enabled 2019/11/06 02:21:03 concurrency sanitizer: enabled 2019/11/06 02:21:03 devlink PCI setup: PCI device 0000:00:10.0 is not available 02:21:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0xfc71, &(0x7f0000000140)={&(0x7f00000000c0)=@newae={0x48, 0x1e, 0x789, 0x0, 0x0, {{@in=@broadcast}, @in=@multicast2}, [@replay_thresh={0x8}]}, 0x48}}, 0x0) 02:21:04 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f00000002c0)=0x6, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0xe26e, 0x0, 0x1}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket(0x0, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) dup2(r4, 0xffffffffffffffff) syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x100000000, 0x301000) r5 = syz_open_procfs(0x0, &(0x7f000076c000)='pagemap\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x800000000fffc) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) close(r6) r7 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r8 = getpid() r9 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r10 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x4000) getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) getresgid(&(0x7f0000001800)=0x0, 0x0, &(0x7f0000001880)) lstat(&(0x7f00000018c0)='./bus\x00', &(0x7f0000001900)) r13 = getgid() r14 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r14, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) r15 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r16 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r16, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r16, 0x4028af11, &(0x7f0000000040)) r17 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r17, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) r18 = getpid() sched_setscheduler(r18, 0x0, &(0x7f0000000380)) getpgid(r18) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r19 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r19, 0x0) write$P9_RWALK(r19, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r19, 0x0) r20 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r19, r20) r21 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) r22 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) fcntl$dupfd(r21, 0x0, r22) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000440), 0x80000) r23 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) r24 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r25 = fcntl$dupfd(r23, 0x0, r24) write$rfkill(r25, &(0x7f0000000100)={0x0, 0x0, 0x3}, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu\x00', 0x0, 0x0) r26 = getegid() r27 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) syz_open_dev$vcsa(&(0x7f0000001ac0)='/dev/vcsa#\x00', 0x400, 0x40000) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) r28 = getpid() sched_setscheduler(r28, 0x0, &(0x7f0000000380)) r29 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) r31 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r31, 0xaf01, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003140)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x20000000}, {&(0x7f0000000300)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x10}, {&(0x7f0000000500)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000001680)=[{0x0}, {&(0x7f0000000600)="9821d0f458fec4b2b88880057c6cbf1f75883f3d67c5ca23b788c472d59e9826fcb02b3cc96e881e4bb6c2f7a64506eda4f7d440b87ba40403a85446d4e222aad74f9bfc9ee12ef570fd6254f984", 0x4e}, {0x0}], 0x3, &(0x7f0000001bc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r8, @ANYRES32, @ANYRES32=r13, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r14, @ANYRES32, @ANYRES32=r6, @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r6, @ANYRES32=r17, @ANYRES32, @ANYBLOB="000000008105c9bfcf4fe0010000000200000000", @ANYRES32, @ANYRES32=r26, @ANYBLOB="00000000140000000000000001000000010000", @ANYRES32=r27, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r28, @ANYRES32=r30, @ANYRES32, @ANYBLOB="000000001c000000000000000105000001000000", @ANYRES32=r7, @ANYRES32, @ANYRES32=r31, @ANYBLOB='\x00\x00\x00\x00'], 0xf7, 0x2008044}, {&(0x7f0000001d00)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}], 0x4, 0x4c010) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r9, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) dup2(r9, 0xffffffffffffffff) ioctl$LOOP_SET_CAPACITY(r9, 0x4c07) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x10d022, 0x8000000) socket$packet(0x11, 0x3, 0x300) [ 71.774475][ T8185] IPVS: ftp: loaded support on port[0] = 21 [ 71.916459][ T8185] chnl_net:caif_netlink_parms(): no params data found 02:21:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:groupadd_exec_t:s0\x00', 0x25) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYRES32, @ANYBLOB="000000000000000003000000080001007533320038000200200007001c000a0000000c00010073616d706c6500000400020004000600000014000500000000"], 0x2}}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0x8, 0x2, [@gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x3c}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {&(0x7f00000002c0)=""/195, 0xc3}, {0x0}], 0x3, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)=@random={'security.', 'mime_type:wlan1)+]%security\x8fem0\\)vmnet0!&em0\xc3}\x00'}, 0x0, 0x0) dup(0xffffffffffffffff) prctl$PR_GET_KEEPCAPS(0x7) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) [ 71.963491][ T8185] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.970703][ T8185] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.979510][ T8185] device bridge_slave_0 entered promiscuous mode [ 71.987042][ T8185] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.994535][ T8185] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.003039][ T8185] device bridge_slave_1 entered promiscuous mode [ 72.031018][ T8185] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.044938][ T8188] IPVS: ftp: loaded support on port[0] = 21 [ 72.053607][ T8185] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.099363][ T8185] team0: Port device team_slave_0 added [ 72.106073][ T8185] team0: Port device team_slave_1 added [ 72.210738][ T8185] device hsr_slave_0 entered promiscuous mode [ 72.247739][ T8185] device hsr_slave_1 entered promiscuous mode 02:21:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'batadv0\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1, r5}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00\x06\bz\x00\x00\x00\xfd\x00', 0xf7fffffffffffffd}) [ 72.323211][ T8190] IPVS: ftp: loaded support on port[0] = 21 [ 72.362801][ T8188] chnl_net:caif_netlink_parms(): no params data found [ 72.410732][ T8185] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.417849][ T8185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.425172][ T8185] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.432279][ T8185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.637904][ T8188] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.651046][ T8188] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.669708][ T8188] device bridge_slave_0 entered promiscuous mode [ 72.719189][ T8188] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.737393][ T8188] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.745276][ T8188] device bridge_slave_1 entered promiscuous mode [ 72.860105][ T8188] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.915541][ T8185] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.949191][ T8188] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.020944][ T8197] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.038455][ T8197] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.079004][ T8197] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 73.126436][ T8217] IPVS: ftp: loaded support on port[0] = 21 [ 73.135941][ T8188] team0: Port device team_slave_0 added [ 73.151647][ T8190] chnl_net:caif_netlink_parms(): no params data found [ 73.182189][ T8188] team0: Port device team_slave_1 added [ 73.210713][ T8185] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.250967][ T8144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.259605][ T8144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.400355][ T8188] device hsr_slave_0 entered promiscuous mode [ 73.457649][ T8188] device hsr_slave_1 entered promiscuous mode [ 73.489403][ T8188] debugfs: Directory 'hsr0' with parent '/' already present! [ 73.502763][ T8144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.521801][ T8144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.548308][ T8144] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.555444][ T8144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.599883][ T8190] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.613937][ T8190] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.642418][ T8190] device bridge_slave_0 entered promiscuous mode [ 73.668358][ T8190] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.675717][ T8190] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.686116][ T8190] device bridge_slave_1 entered promiscuous mode 02:21:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, {0x2}}}}]}, 0x38}}, 0x0) [ 73.703504][ T8220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.723787][ T8193] ================================================================== [ 73.729076][ T8220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.731970][ T8193] BUG: KCSAN: data-race in generic_permission / kernfs_refresh_inode [ 73.747961][ T8193] [ 73.750302][ T8193] write to 0xffff88812a786db0 of 2 bytes by task 8105 on cpu 1: [ 73.757955][ T8193] kernfs_refresh_inode+0x42/0x140 [ 73.763083][ T8193] kernfs_iop_permission+0x66/0xa0 [ 73.768217][ T8193] inode_permission+0x241/0x3c0 [ 73.771406][ T8220] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.773106][ T8193] link_path_walk.part.0+0x622/0xa90 [ 73.780178][ T8220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.785378][ T8193] path_lookupat.isra.0+0x77/0x5a0 [ 73.785406][ T8193] filename_lookup+0x145/0x2b0 [ 73.802444][ T8193] user_path_at_empty+0x4c/0x70 [ 73.807340][ T8193] vfs_statx+0xd9/0x190 [ 73.808032][ T8220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.811495][ T8193] __do_sys_newstat+0x51/0xb0 [ 73.811512][ T8193] __x64_sys_newstat+0x3a/0x50 [ 73.811530][ T8193] do_syscall_64+0xcc/0x370 [ 73.811561][ T8193] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.839477][ T8193] [ 73.841813][ T8193] read to 0xffff88812a786db0 of 2 bytes by task 8193 on cpu 0: [ 73.849374][ T8193] generic_permission+0x36/0x3d0 [ 73.854325][ T8193] kernfs_iop_permission+0x7d/0xa0 [ 73.859446][ T8193] inode_permission+0x241/0x3c0 [ 73.864306][ T8193] link_path_walk.part.0+0x622/0xa90 [ 73.869598][ T8193] path_openat+0x14f/0x36e0 [ 73.874112][ T8193] do_filp_open+0x11e/0x1b0 [ 73.879145][ T8193] do_sys_open+0x3b3/0x4f0 [ 73.883580][ T8193] __x64_sys_open+0x55/0x70 [ 73.888096][ T8193] do_syscall_64+0xcc/0x370 [ 73.892616][ T8193] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.898501][ T8193] [ 73.900842][ T8193] Reported by Kernel Concurrency Sanitizer on: [ 73.907006][ T8193] CPU: 0 PID: 8193 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 73.914027][ T8193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.919162][ T8220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.924180][ T8193] ================================================================== [ 73.940153][ T8193] Kernel panic - not syncing: panic_on_warn set ... [ 73.946759][ T8193] CPU: 0 PID: 8193 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 73.953802][ T8193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.963868][ T8193] Call Trace: [ 73.967200][ T8193] dump_stack+0xf5/0x159 [ 73.971457][ T8193] panic+0x210/0x640 [ 73.975377][ T8193] ? vprintk_func+0x8d/0x140 [ 73.979981][ T8193] kcsan_report.cold+0xc/0xe [ 73.984589][ T8193] kcsan_setup_watchpoint+0x3fe/0x410 [ 73.989977][ T8193] __tsan_read2+0x145/0x1f0 [ 73.994505][ T8193] generic_permission+0x36/0x3d0 [ 73.999087][ T8220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.999465][ T8193] kernfs_iop_permission+0x7d/0xa0 [ 74.012464][ T8193] ? kernfs_iop_getattr+0x90/0x90 [ 74.020486][ T8193] inode_permission+0x241/0x3c0 [ 74.025364][ T8193] link_path_walk.part.0+0x622/0xa90 [ 74.030681][ T8193] path_openat+0x14f/0x36e0 [ 74.035205][ T8193] ? __rcu_read_unlock+0x66/0x3c0 [ 74.040250][ T8193] ? __read_once_size.constprop.0+0x12/0x20 [ 74.046162][ T8193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 74.052856][ T8193] ? debug_smp_processor_id+0x4c/0x172 [ 74.058334][ T8193] ? __d_free_external+0x60/0x60 [ 74.061980][ T8220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.063297][ T8193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 74.077319][ T8193] ? debug_smp_processor_id+0x4c/0x172 [ 74.082814][ T8193] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 74.088724][ T8193] ? __read_once_size+0x41/0xe0 [ 74.093602][ T8193] do_filp_open+0x11e/0x1b0 [ 74.098126][ T8193] ? __alloc_fd+0x2ef/0x3b0 [ 74.102657][ T8193] do_sys_open+0x3b3/0x4f0 [ 74.107118][ T8193] __x64_sys_open+0x55/0x70 [ 74.111644][ T8193] do_syscall_64+0xcc/0x370 [ 74.116171][ T8193] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 74.122076][ T8193] RIP: 0033:0x7f896235b120 [ 74.126540][ T8193] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 74.146421][ T8193] RSP: 002b:00007ffee5e95a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 74.154850][ T8193] RAX: ffffffffffffffda RBX: 0000000002266e90 RCX: 00007f896235b120 [ 74.162837][ T8193] RDX: 00000000000001b6 RSI: 0000000000080000 RDI: 00007ffee5e95b00 [ 74.170820][ T8193] RBP: 00007ffee5e95aa0 R08: 0000000000000008 R09: 0000000000000001 [ 74.178807][ T8193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 74.186915][ T8193] R13: 000000000041f57a R14: 0000000000000000 R15: 000000000000000b [ 74.196215][ T8193] Kernel Offset: disabled [ 74.200550][ T8193] Rebooting in 86400 seconds..