[ 55.418354][ T26] audit: type=1800 audit(1572923785.612:26): pid=7913 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 55.456394][ T26] audit: type=1800 audit(1572923785.612:27): pid=7913 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 55.479234][ T26] audit: type=1800 audit(1572923785.612:28): pid=7913 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 56.369336][ T26] audit: type=1800 audit(1572923786.602:29): pid=7913 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.73' (ECDSA) to the list of known hosts. 2019/11/05 03:16:36 fuzzer started 2019/11/05 03:16:39 dialing manager at 10.128.0.105:37793 2019/11/05 03:16:39 syscalls: 2553 2019/11/05 03:16:39 code coverage: enabled 2019/11/05 03:16:39 comparison tracing: enabled 2019/11/05 03:16:39 extra coverage: extra coverage is not supported by the kernel 2019/11/05 03:16:39 setuid sandbox: enabled 2019/11/05 03:16:39 namespace sandbox: enabled 2019/11/05 03:16:39 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 03:16:39 fault injection: enabled 2019/11/05 03:16:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 03:16:39 net packet injection: enabled 2019/11/05 03:16:39 net device setup: enabled 2019/11/05 03:16:39 concurrency sanitizer: enabled 2019/11/05 03:16:39 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 74.042516][ T8084] KCSAN: could not find function: 'poll_schedule_timeout' [ 75.426642][ T8084] KCSAN: could not find function: '__mutex_lock' 2019/11/05 03:16:50 adding functions to KCSAN blacklist: 'ext4_nonda_switch' 'audit_log_start' 'p9_poll_workfn' 'snapshot_refaults' 'pid_update_inode' 'do_nanosleep' 'vm_area_dup' 'fanotify_handle_event' '__alloc_file' 'blk_mq_run_hw_queue' '__mark_inode_dirty' '__snd_rawmidi_transmit_ack' 'rcu_gp_fqs_check_wake' 'tick_nohz_idle_stop_tick' 'xas_find_marked' '__skb_try_recv_from_queue' 'yama_ptracer_del' 'tcp_add_backlog' 'ext4_free_inodes_count' 'do_exit' 'find_get_pages_range_tag' 'lruvec_lru_size' 'shmem_getpage_gfp' 'page_counter_try_charge' 'tick_sched_do_timer' 'poll_schedule_timeout' 'mod_timer' 'copy_process' 'add_timer_on' '__splice_from_pipe' 'do_syslog' 'ktime_get_real_seconds' 'taskstats_exit' '__rcu_read_unlock' 'tomoyo_supervisor' 'ep_poll' 'ktime_get_seconds' 'pcpu_alloc' '__mutex_lock' 'netlink_dump' 'n_tty_receive_buf_common' 'wbc_attach_and_unlock_inode' 'atime_needs_update' 'dd_has_work' 'xas_clear_mark' 'process_srcu' 'rcu_gp_fqs_loop' 'ext4_has_free_clusters' 'generic_write_end' 'pipe_poll' 'echo_char' 'task_dump_owner' 'mem_cgroup_select_victim_node' 'wbt_done' 'blk_mq_get_request' 'ext4_da_write_end' 'run_timer_softirq' 'generic_permission' '__ext4_new_inode' 'futex_wait_queue_me' 'kvm_arch_vcpu_load' 'inet_putpeer' 'fasync_remove_entry' 'find_next_bit' 'ext4_free_inode' 'generic_fillattr' 'add_timer' 'list_lru_count_one' 'ext4_mark_iloc_dirty' 'virtqueue_enable_cb_delayed' 'enqueue_timer' 'ext4_mb_good_group' 'tick_do_update_jiffies64' 'blk_mq_dispatch_rq_list' 'timer_clear_idle' 'kauditd_thread' '__hrtimer_run_queues' 'blk_mq_sched_dispatch_requests' 'get_task_cred' 03:20:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="4800000004000600000000006f0000000ddb26a63413890f06424802c20b7810a9cd20aa3a4813cb4c73b430b6124e7de3518d2fe7e789ee879e33ca902d58f130"], 0x1}}, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r5 = dup3(r0, r1, 0x0) ioctl$KVM_SET_CPUID(r2, 0xc008aec1, &(0x7f00000001c0)=ANY=[]) dup2(r5, r2) 03:20:32 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) mmap(&(0x7f0000fb4000/0x2000)=nil, 0x2000, 0x0, 0x2011, r0, 0x0) [ 302.056245][ T8089] IPVS: ftp: loaded support on port[0] = 21 [ 302.175031][ T8089] chnl_net:caif_netlink_parms(): no params data found [ 302.244105][ T8089] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.258307][ T8089] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.266399][ T8089] device bridge_slave_0 entered promiscuous mode [ 302.280889][ T8092] IPVS: ftp: loaded support on port[0] = 21 [ 302.288948][ T8089] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.297319][ T8089] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.309670][ T8089] device bridge_slave_1 entered promiscuous mode [ 302.352847][ T8089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 302.364178][ T8089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 302.391276][ T8089] team0: Port device team_slave_0 added 03:20:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x5, 0x102) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000280)=ANY=[@ANYBLOB="00000700aaaaaaaaaa0e0180c2000000aaaaaaaaaa00000000001000aaaaaaaaaabbaaaaaaaaaabbaaaaaaaaaabbbf0bc0a0c0f6fecb2ee3377666b0f4cef912f7bc5ab69507edb76480737970aa05c42601000080a8283215b1c2f328d0060052861f34229929852534951075e608306501979ea1245a665044e3d49e0eb59616e90322fa780fe5a614a143baa416cfea344dc3cf948bb04bdacf002fd98daeb26943797833316cb6aae678d58956e944ce2e9a1c3b8df4645b3e55f632"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x10, 0x5, 0x8) [ 302.398071][ T8089] team0: Port device team_slave_1 added [ 302.501689][ T8089] device hsr_slave_0 entered promiscuous mode 03:20:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) shutdown(r1, 0x0) sendto$inet6(r1, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @rand_addr="7f288fcd794a8e7eed39ab26a6faef6f"}, 0x1c) sendto$inet6(r1, &(0x7f0000000200)="e8", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) close(r1) [ 302.618714][ T8089] device hsr_slave_1 entered promiscuous mode [ 302.692395][ T8095] IPVS: ftp: loaded support on port[0] = 21 [ 302.714679][ T8092] chnl_net:caif_netlink_parms(): no params data found [ 302.853860][ T8089] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.861002][ T8089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.868352][ T8089] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.875421][ T8089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.024235][ T8092] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.049791][ T8092] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.078359][ T8092] device bridge_slave_0 entered promiscuous mode [ 303.131577][ T8092] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.149464][ T8092] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.157435][ T8092] device bridge_slave_1 entered promiscuous mode [ 303.200505][ T8089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.213559][ T8121] IPVS: ftp: loaded support on port[0] = 21 [ 303.271196][ T2886] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.309832][ T2886] bridge0: port 2(bridge_slave_1) entered disabled state 03:20:33 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x18, &(0x7f0000000140)={r2}, 0x8) [ 303.339550][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 303.377580][ T8095] chnl_net:caif_netlink_parms(): no params data found [ 303.447423][ T8089] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.490720][ T8092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 303.518490][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.526495][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.572628][ T8092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 303.599611][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.628967][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.650321][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.657391][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.698928][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.731020][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.770855][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.777961][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.819053][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 303.851967][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 303.888207][ T8089] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 303.938298][ T8089] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 303.996690][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 304.010365][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 304.039356][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.071029][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.099574][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.139037][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.171253][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.199516][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.258708][ T8095] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.261972][ T8126] IPVS: ftp: loaded support on port[0] = 21 [ 304.266009][ T8095] bridge0: port 1(bridge_slave_0) entered disabled state 03:20:34 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000000)="0100000000000000180100000500000000000000000000002f") [ 304.329169][ T8095] device bridge_slave_0 entered promiscuous mode [ 304.347768][ T8092] team0: Port device team_slave_0 added [ 304.372010][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.386273][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.421786][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 304.448679][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 304.461104][ T8095] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.468187][ T8095] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.515393][ T8095] device bridge_slave_1 entered promiscuous mode [ 304.536560][ T8092] team0: Port device team_slave_1 added [ 304.584625][ T8089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.633786][ T8095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.655679][ T8121] chnl_net:caif_netlink_parms(): no params data found [ 304.720364][ T8092] device hsr_slave_0 entered promiscuous mode [ 304.768560][ T8092] device hsr_slave_1 entered promiscuous mode [ 304.838433][ T8092] debugfs: Directory 'hsr0' with parent '/' already present! [ 304.847049][ T8095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.862887][ T8138] IPVS: ftp: loaded support on port[0] = 21 [ 304.894365][ T8095] team0: Port device team_slave_0 added [ 304.901325][ T8095] team0: Port device team_slave_1 added [ 304.980353][ T8121] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.000770][ T8121] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.014972][ T8121] device bridge_slave_0 entered promiscuous mode [ 305.108756][ T8156] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 305.127582][ T8095] device hsr_slave_0 entered promiscuous mode [ 305.188593][ T8095] device hsr_slave_1 entered promiscuous mode [ 305.228411][ T8095] debugfs: Directory 'hsr0' with parent '/' already present! [ 305.257228][ T8121] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.288468][ T8121] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.296369][ T8121] device bridge_slave_1 entered promiscuous mode [ 305.512631][ T8121] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 305.617560][ T8126] chnl_net:caif_netlink_parms(): no params data found [ 305.678647][ T8121] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:20:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x19) read(r0, 0x0, 0x0) [ 305.740707][ T8092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.889874][ T8138] chnl_net:caif_netlink_parms(): no params data found [ 305.975742][ T8092] 8021q: adding VLAN 0 to HW filter on device team0 03:20:36 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 306.070159][ T8115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.078004][ T8115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.166971][ T8121] team0: Port device team_slave_0 added [ 306.239624][ T8121] team0: Port device team_slave_1 added [ 306.247731][ T8095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.313873][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 306.344008][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.403268][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.410461][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.477517][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 306.524080][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.571331][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.578547][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.651864][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 306.713789][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 306.762635][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 306.813738][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 306.923427][ T8138] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.981886][ T8138] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.035035][ T8138] device bridge_slave_0 entered promiscuous mode [ 307.069889][ T8138] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.076971][ T8138] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.169141][ T8138] device bridge_slave_1 entered promiscuous mode [ 307.189919][ T8126] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.196999][ T8126] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.246170][ T8126] device bridge_slave_0 entered promiscuous mode [ 307.295713][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 307.310578][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 307.366078][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 307.403408][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.487354][ T8126] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.505507][ T8126] bridge0: port 2(bridge_slave_1) entered disabled state 03:20:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000080)={0x0, 0x9}) [ 307.531700][ T8126] device bridge_slave_1 entered promiscuous mode [ 307.571399][ T8095] 8021q: adding VLAN 0 to HW filter on device team0 [ 307.613271][ T8092] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 307.638297][ T8092] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 307.733308][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 307.755077][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.787676][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 307.842824][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 307.876704][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 307.914737][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 307.953598][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 307.985815][ T8138] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 03:20:38 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x400000000000001}}, 0x28) [ 308.060914][ T8121] device hsr_slave_0 entered promiscuous mode [ 308.099670][ T8121] device hsr_slave_1 entered promiscuous mode [ 308.138312][ T8121] debugfs: Directory 'hsr0' with parent '/' already present! [ 308.176176][ T8092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 308.220401][ T8138] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 308.230217][ T8184] ================================================================== [ 308.238380][ T8184] BUG: KCSAN: data-race in d_lru_del / lookup_fast [ 308.245054][ T8184] [ 308.247398][ T8184] write to 0xffff888124d11240 of 4 bytes by task 1 on cpu 0: [ 308.254791][ T8184] d_lru_del+0x5d/0xf0 [ 308.258880][ T8184] __dput_to_list+0xe9/0xf0 [ 308.263406][ T8184] shrink_dentry_list+0x101/0x1c0 [ 308.268671][ T8184] shrink_dcache_parent+0x1ef/0x280 [ 308.273878][ T8184] d_invalidate+0x85/0x180 [ 308.278304][ T8184] proc_flush_task+0x14c/0x2e0 [ 308.283079][ T8184] release_task+0x83/0xc60 [ 308.287515][ T8184] wait_consider_task+0x190e/0x1a10 [ 308.292727][ T8184] do_wait+0x1c9/0x4c0 [ 308.293629][ T8138] team0: Port device team_slave_0 added [ 308.296806][ T8184] kernel_wait4+0x156/0x240 [ 308.296833][ T8184] __do_sys_wait4+0xea/0x100 [ 308.311529][ T8184] __x64_sys_wait4+0x5e/0x80 [ 308.314817][ T8138] team0: Port device team_slave_1 added [ 308.316133][ T8184] do_syscall_64+0xcc/0x370 [ 308.316166][ T8184] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 308.333735][ T8184] [ 308.336070][ T8184] read to 0xffff888124d11240 of 4 bytes by task 8184 on cpu 1: [ 308.343712][ T8184] lookup_fast+0x59e/0x700 [ 308.348165][ T8184] walk_component+0x6d/0xe70 [ 308.352779][ T8184] link_path_walk.part.0+0x5d3/0xa90 [ 308.358085][ T8184] path_openat+0x14f/0x36e0 [ 308.362604][ T8184] do_filp_open+0x11e/0x1b0 [ 308.367143][ T8184] do_sys_open+0x3b3/0x4f0 [ 308.371571][ T8184] __x64_sys_open+0x55/0x70 [ 308.376084][ T8184] do_syscall_64+0xcc/0x370 [ 308.380616][ T8184] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 308.386530][ T8184] [ 308.388872][ T8184] Reported by Kernel Concurrency Sanitizer on: [ 308.395036][ T8184] CPU: 1 PID: 8184 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 308.401797][ T8184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.411884][ T8184] ================================================================== [ 308.420142][ T8184] Kernel panic - not syncing: panic_on_warn set ... [ 308.426742][ T8184] CPU: 1 PID: 8184 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 308.433517][ T8184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.443677][ T8184] Call Trace: [ 308.447167][ T8184] dump_stack+0xf5/0x159 [ 308.451603][ T8184] panic+0x210/0x640 [ 308.455533][ T8184] ? vprintk_func+0x8d/0x140 [ 308.460148][ T8184] kcsan_report.cold+0xc/0xe [ 308.464770][ T8184] kcsan_setup_watchpoint+0x3fe/0x410 03:20:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0xa}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x1}, 0x20) [ 308.470171][ T8184] __tsan_read4+0x145/0x1f0 [ 308.474691][ T8184] lookup_fast+0x59e/0x700 [ 308.479144][ T8184] walk_component+0x6d/0xe70 [ 308.483761][ T8184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.490031][ T8184] ? security_inode_permission+0xa5/0xc0 [ 308.495692][ T8184] ? inode_permission+0xa0/0x3c0 [ 308.501115][ T8184] link_path_walk.part.0+0x5d3/0xa90 [ 308.506465][ T8184] path_openat+0x14f/0x36e0 [ 308.511387][ T8184] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 308.517331][ T8184] ? __rcu_read_unlock+0x66/0x3c0 [ 308.522843][ T8184] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 308.528759][ T8184] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 308.535118][ T8184] ? __read_once_size+0x41/0xe0 [ 308.540216][ T8184] do_filp_open+0x11e/0x1b0 [ 308.544752][ T8184] ? __alloc_fd+0x2ef/0x3b0 [ 308.549269][ T8184] do_sys_open+0x3b3/0x4f0 [ 308.553688][ T8184] __x64_sys_open+0x55/0x70 [ 308.558269][ T8184] do_syscall_64+0xcc/0x370 [ 308.562799][ T8184] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 308.568869][ T8184] RIP: 0033:0x7f6418098120 [ 308.573292][ T8184] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 308.595559][ T8184] RSP: 002b:00007ffe33d04f98 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 308.603974][ T8184] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f6418098120 [ 308.611957][ T8184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f6418566d00 [ 308.619932][ T8184] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f6418360a10 [ 308.627918][ T8184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6418565d00 [ 308.635889][ T8184] R13: 00000000016551c0 R14: 0000000000000005 R15: 0000000000000000 [ 308.645347][ T8184] Kernel Offset: disabled [ 308.649777][ T8184] Rebooting in 86400 seconds..