[ 55.415432][ T25] audit: type=1800 audit(1573198140.028:27): pid=7910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 55.458987][ T25] audit: type=1800 audit(1573198140.028:28): pid=7910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 56.178359][ T25] audit: type=1800 audit(1573198140.868:29): pid=7910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 56.201561][ T25] audit: type=1800 audit(1573198140.868:30): pid=7910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.69' (ECDSA) to the list of known hosts. 2019/11/08 07:29:07 fuzzer started 2019/11/08 07:29:09 dialing manager at 10.128.0.105:41185 2019/11/08 07:29:09 syscalls: 2553 2019/11/08 07:29:09 code coverage: enabled 2019/11/08 07:29:09 comparison tracing: enabled 2019/11/08 07:29:09 extra coverage: extra coverage is not supported by the kernel 2019/11/08 07:29:09 setuid sandbox: enabled 2019/11/08 07:29:09 namespace sandbox: enabled 2019/11/08 07:29:09 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/08 07:29:09 fault injection: enabled 2019/11/08 07:29:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/08 07:29:09 net packet injection: enabled 2019/11/08 07:29:09 net device setup: enabled 2019/11/08 07:29:09 concurrency sanitizer: enabled 2019/11/08 07:29:09 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 67.658213][ T8075] KCSAN: could not find function: 'may_open' 2019/11/08 07:29:13 adding functions to KCSAN blacklist: 'blk_mq_dispatch_rq_list' 'ktime_get_real_seconds' 'generic_write_end' 'find_next_bit' 'do_dentry_open' 'pipe_poll' 'echo_char' 'ext4_free_inode' 'find_get_pages_range_tag' 'generic_permission' 'tomoyo_supervisor' 'run_timer_softirq' 'tcp_add_backlog' 'ep_poll' 'tick_do_update_jiffies64' 'may_open' 'ima_file_free' '__hrtimer_run_queues' 'vm_area_dup' 'common_perm_cond' 'rcu_gp_fqs_loop' 'do_nanosleep' '__ext4_new_inode' 'mod_timer' 07:29:22 executing program 0: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 77.938458][ T8079] IPVS: ftp: loaded support on port[0] = 21 07:29:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) mount$9p_rdma(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@common=@noextend='noextend'}, {@rq={'rq', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0x8}}]}}) chown(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xee01, 0xee00) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 78.020580][ T8079] chnl_net:caif_netlink_parms(): no params data found [ 78.065340][ T8079] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.090565][ T8079] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.098583][ T8079] device bridge_slave_0 entered promiscuous mode [ 78.121699][ T8079] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.128848][ T8079] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.151312][ T8079] device bridge_slave_1 entered promiscuous mode [ 78.195751][ T8079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.212676][ T8082] IPVS: ftp: loaded support on port[0] = 21 [ 78.222561][ T8079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:29:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10002, 0x8) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) [ 78.264022][ T8079] team0: Port device team_slave_0 added [ 78.271158][ T8079] team0: Port device team_slave_1 added [ 78.353316][ T8079] device hsr_slave_0 entered promiscuous mode [ 78.381438][ T8079] device hsr_slave_1 entered promiscuous mode [ 78.510762][ T8084] IPVS: ftp: loaded support on port[0] = 21 [ 78.525806][ T8082] chnl_net:caif_netlink_parms(): no params data found [ 78.587142][ T8079] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.594282][ T8079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.601797][ T8079] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.608841][ T8079] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.772988][ T8082] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.780135][ T8082] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.801656][ T8082] device bridge_slave_0 entered promiscuous mode [ 78.828684][ T8079] 8021q: adding VLAN 0 to HW filter on device bond0 07:29:23 executing program 3: creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(&(0x7f0000000080)=@sg0='ubi8_sg0\x00', &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='ubifs\x00', 0x0, 0x0) [ 78.880299][ T8082] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.900651][ T8082] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.920595][ T8082] device bridge_slave_1 entered promiscuous mode [ 78.958364][ T8079] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.983521][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.013090][ T3012] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.042872][ T3012] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.071918][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 79.148170][ T8084] chnl_net:caif_netlink_parms(): no params data found [ 79.199273][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.209461][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.216558][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.282413][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.322067][ T3012] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.329161][ T3012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.362321][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 79.398336][ T8082] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.444526][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 79.455358][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 79.463021][ T8111] IPVS: ftp: loaded support on port[0] = 21 [ 79.511648][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.529348][ T8079] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 79.560516][ T8079] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 79.603115][ T8082] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.629711][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.655375][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.673308][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.711026][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.760981][ T8079] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.786865][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 79.796819][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.833100][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.851451][ T8084] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.858563][ T8084] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.903404][ T8084] device bridge_slave_0 entered promiscuous mode [ 79.927048][ T8082] team0: Port device team_slave_0 added [ 79.945191][ T8084] bridge0: port 2(bridge_slave_1) entered blocking state 07:29:24 executing program 4: set_mempolicy(0x4001, &(0x7f0000000040)=0x6c554818, 0x5) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) [ 79.973192][ T8084] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.008702][ T8084] device bridge_slave_1 entered promiscuous mode [ 80.052104][ T8082] team0: Port device team_slave_1 added [ 80.179782][ T8084] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.309084][ T8082] device hsr_slave_0 entered promiscuous mode [ 80.370931][ T8082] device hsr_slave_1 entered promiscuous mode [ 80.410594][ T8082] debugfs: Directory 'hsr0' with parent '/' already present! [ 80.432826][ T8084] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.482835][ T8129] IPVS: ftp: loaded support on port[0] = 21 [ 80.575673][ T8084] team0: Port device team_slave_0 added [ 80.592770][ T8084] team0: Port device team_slave_1 added [ 80.598668][ T8111] chnl_net:caif_netlink_parms(): no params data found 07:29:25 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f00000000c0)=0x1) r6 = dup(0xffffffffffffffff) ioctl$VIDIOC_DQBUF(r6, 0xc0585611, &(0x7f0000000240)={0x0, 0x1a, 0x4, 0x40, {}, {0x1, 0xc, 0x3, 0xef, 0x0, 0x0, "b1a973d2"}, 0x7f, 0x2, @fd, 0x4}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000003c0)=0xd) ioctl$TIOCSETD(r7, 0x5437, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) [ 80.823125][ T8084] device hsr_slave_0 entered promiscuous mode [ 80.870939][ T8084] device hsr_slave_1 entered promiscuous mode [ 80.891069][ T8084] debugfs: Directory 'hsr0' with parent '/' already present! [ 80.937516][ T8111] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.982896][ T8111] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.031017][ T8111] device bridge_slave_0 entered promiscuous mode [ 81.063899][ T8111] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.090528][ T8111] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.130632][ T8111] device bridge_slave_1 entered promiscuous mode [ 81.209969][ T8111] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.303887][ T8111] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.345927][ T8156] IPVS: ftp: loaded support on port[0] = 21 [ 81.422505][ T8082] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.502038][ T8111] team0: Port device team_slave_0 added [ 81.534136][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.561318][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.612612][ T8082] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.655888][ T8111] team0: Port device team_slave_1 added [ 81.777648][ T8084] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.827064][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 81.836655][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.891322][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.898526][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state 07:29:26 executing program 0: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 81.991351][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.034026][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.083750][ T3012] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.090852][ T3012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.183816][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.244562][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:29:27 executing program 0: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 82.292795][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.351227][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.424000][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 82.463916][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.545478][ T8084] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.593763][ T8129] chnl_net:caif_netlink_parms(): no params data found [ 82.615317][ T8082] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 82.651694][ T8082] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 82.767138][ T8111] device hsr_slave_0 entered promiscuous mode [ 82.860857][ T8111] device hsr_slave_1 entered promiscuous mode [ 82.893840][ T8111] debugfs: Directory 'hsr0' with parent '/' already present! [ 82.923333][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.934590][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.995925][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.045729][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.101464][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.149546][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.203902][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.256687][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.292510][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.300206][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.351220][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.381444][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.388615][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.467118][ T8082] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.529399][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.546071][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 83.615885][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 83.823073][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.851426][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 07:29:28 executing program 0: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 83.904465][ T3506] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.911696][ T3506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.019267][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.094953][ T8129] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.103061][ T8129] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.131595][ T8129] device bridge_slave_0 entered promiscuous mode [ 84.192333][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 84.211009][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 84.252571][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 84.291727][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 84.340755][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 84.371822][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.388848][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.420649][ T8129] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.427808][ T8129] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.480431][ T8129] device bridge_slave_1 entered promiscuous mode [ 84.512796][ T8084] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 84.546556][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.556499][ C1] hrtimer: interrupt took 25554 ns [ 84.622887][ T8156] chnl_net:caif_netlink_parms(): no params data found [ 84.662385][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 84.680853][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.696171][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.755987][ T8129] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.834693][ T8129] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.991789][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 84.999292][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:29:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) mount$9p_rdma(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@common=@noextend='noextend'}, {@rq={'rq', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0x8}}]}}) chown(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xee01, 0xee00) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 85.064717][ T8084] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.097742][ T8156] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.160766][ T8156] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.168937][ T8156] device bridge_slave_0 entered promiscuous mode [ 85.198230][ T8111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.242503][ T8129] team0: Port device team_slave_0 added [ 85.250152][ T8129] team0: Port device team_slave_1 added [ 85.302154][ T8156] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.309399][ T8156] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.339450][ T8156] device bridge_slave_1 entered promiscuous mode [ 85.436464][ T8111] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.533213][ T8129] device hsr_slave_0 entered promiscuous mode [ 85.561218][ T8129] device hsr_slave_1 entered promiscuous mode [ 85.600551][ T8129] debugfs: Directory 'hsr0' with parent '/' already present! [ 85.628795][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.642330][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.712604][ T8156] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.811034][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.836761][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:29:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) mount$9p_rdma(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@common=@noextend='noextend'}, {@rq={'rq', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0x8}}]}}) chown(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xee01, 0xee00) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 85.855557][ T25] audit: type=1326 audit(1573198170.548:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8246 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d05a code=0x0 [ 85.879504][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.886639][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 07:29:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) mount$9p_rdma(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@common=@noextend='noextend'}, {@rq={'rq', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0x8}}]}}) chown(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xee01, 0xee00) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 85.953442][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.008776][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.059946][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.067157][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.146271][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.208176][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.276119][ T8156] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.325901][ T8111] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 86.415442][ T8111] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.489917][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 86.508461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.556233][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 07:29:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) mount$9p_rdma(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@common=@noextend='noextend'}, {@rq={'rq', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0x8}}]}}) chown(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xee01, 0xee00) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 86.596819][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.623515][ T25] audit: type=1326 audit(1573198171.318:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8246 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d05a code=0x0 [ 86.637129][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.757347][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 07:29:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10002, 0x8) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) [ 86.803584][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 86.861742][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 86.901413][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 07:29:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) mount$9p_rdma(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@common=@noextend='noextend'}, {@rq={'rq', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0x8}}]}}) chown(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xee01, 0xee00) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 86.925687][ T25] audit: type=1326 audit(1573198171.618:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8279 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d05a code=0x0 [ 86.944408][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.968549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 87.032526][ T8111] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 87.067753][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 87.083826][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 87.132557][ T8156] team0: Port device team_slave_0 added [ 87.139377][ T8156] team0: Port device team_slave_1 added [ 87.323201][ T8156] device hsr_slave_0 entered promiscuous mode [ 87.351332][ T8156] device hsr_slave_1 entered promiscuous mode [ 87.450654][ T8156] debugfs: Directory 'hsr0' with parent '/' already present! [ 87.668678][ T8129] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.797024][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.841346][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.851857][ T8129] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.872930][ T8317] UBIFS error (pid: 8317): cannot open "ubi8_sg0", error -22 [ 87.975721][ T8318] ================================================================== [ 87.991240][ T8318] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 87.998855][ T8318] [ 88.001195][ T8318] read to 0xffff8881245487f8 of 2 bytes by task 8314 on cpu 1: [ 88.008760][ T8318] pid_update_inode+0x25/0x70 [ 88.013454][ T8318] pid_revalidate+0x91/0xd0 [ 88.017971][ T8318] lookup_fast+0x618/0x700 [ 88.022390][ T8318] path_openat+0x2ac/0x36e0 [ 88.026887][ T8318] do_filp_open+0x11e/0x1b0 [ 88.031388][ T8318] do_sys_open+0x3b3/0x4f0 [ 88.035812][ T8318] __x64_sys_open+0x55/0x70 [ 88.040328][ T8318] do_syscall_64+0xcc/0x370 [ 88.044853][ T8318] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 88.050736][ T8318] [ 88.053079][ T8318] write to 0xffff8881245487f8 of 2 bytes by task 8318 on cpu 0: [ 88.060721][ T8318] pid_update_inode+0x51/0x70 [ 88.065410][ T8318] pid_revalidate+0x91/0xd0 [ 88.069926][ T8318] lookup_fast+0x618/0x700 [ 88.074352][ T8318] path_openat+0x2ac/0x36e0 [ 88.078860][ T8318] do_filp_open+0x11e/0x1b0 [ 88.083367][ T8318] do_sys_open+0x3b3/0x4f0 [ 88.087794][ T8318] __x64_sys_open+0x55/0x70 [ 88.092299][ T8318] do_syscall_64+0xcc/0x370 [ 88.096811][ T8318] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 88.102696][ T8318] [ 88.105025][ T8318] Reported by Kernel Concurrency Sanitizer on: [ 88.111185][ T8318] CPU: 0 PID: 8318 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 88.117962][ T8318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.128015][ T8318] ================================================================== [ 88.136103][ T8318] Kernel panic - not syncing: panic_on_warn set ... [ 88.142699][ T8318] CPU: 0 PID: 8318 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 88.149453][ T8318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.159509][ T8318] Call Trace: [ 88.162818][ T8318] dump_stack+0xf5/0x159 [ 88.167071][ T8318] panic+0x210/0x640 [ 88.170974][ T8318] ? btrfs_log_inode+0x11a7/0x1d30 [ 88.176093][ T8318] ? vprintk_func+0x8d/0x140 [ 88.180704][ T8318] kcsan_report.cold+0xc/0xe [ 88.185316][ T8318] kcsan_setup_watchpoint+0x3fe/0x410 [ 88.190708][ T8318] __tsan_unaligned_write2+0x143/0x1f0 [ 88.196182][ T8318] pid_update_inode+0x51/0x70 [ 88.200871][ T8318] pid_revalidate+0x91/0xd0 [ 88.205382][ T8318] lookup_fast+0x618/0x700 [ 88.209905][ T8318] path_openat+0x2ac/0x36e0 [ 88.214441][ T8318] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 88.220385][ T8318] ? __read_once_size+0x41/0xe0 [ 88.225251][ T8318] do_filp_open+0x11e/0x1b0 [ 88.229777][ T8318] ? __alloc_fd+0x2ef/0x3b0 [ 88.234300][ T8318] do_sys_open+0x3b3/0x4f0 [ 88.238732][ T8318] __x64_sys_open+0x55/0x70 [ 88.243243][ T8318] do_syscall_64+0xcc/0x370 [ 88.247762][ T8318] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 88.253654][ T8318] RIP: 0033:0x7fc190164120 [ 88.258089][ T8318] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 88.277795][ T8318] RSP: 002b:00007ffcec360408 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 88.286227][ T8318] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fc190164120 [ 88.294208][ T8318] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fc190632d00 [ 88.302193][ T8318] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007fc19042ca10 [ 88.310171][ T8318] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc190631d00 [ 88.318151][ T8318] R13: 000000000123c1c0 R14: 0000000000000005 R15: 0000000000000000 [ 88.327722][ T8318] Kernel Offset: disabled [ 88.332054][ T8318] Rebooting in 86400 seconds..