[ 56.530974][ T26] audit: type=1800 audit(1573542102.996:28): pid=7709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 57.130743][ T7772] sshd (7772) used greatest stack depth: 10128 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.375840][ T26] audit: type=1800 audit(1573542103.926:29): pid=7709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 57.396754][ T26] audit: type=1800 audit(1573542103.926:30): pid=7709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.205' (ECDSA) to the list of known hosts. 2019/11/12 07:01:53 fuzzer started 2019/11/12 07:01:55 dialing manager at 10.128.0.105:44241 2019/11/12 07:01:56 syscalls: 2566 2019/11/12 07:01:56 code coverage: enabled 2019/11/12 07:01:56 comparison tracing: enabled 2019/11/12 07:01:56 extra coverage: extra coverage is not supported by the kernel 2019/11/12 07:01:56 setuid sandbox: enabled 2019/11/12 07:01:56 namespace sandbox: enabled 2019/11/12 07:01:56 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/12 07:01:56 fault injection: enabled 2019/11/12 07:01:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/12 07:01:56 net packet injection: enabled 2019/11/12 07:01:56 net device setup: enabled 2019/11/12 07:01:56 concurrency sanitizer: enabled 2019/11/12 07:01:56 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 73.089996][ T7876] KCSAN: could not find function: 'poll_schedule_timeout' [ 80.954355][ T7876] KCSAN: could not find function: 'do_cpu_nanosleep' [ 84.264569][ T7876] KCSAN: could not find function: 'calc_wb_limits' 2019/11/12 07:02:12 adding functions to KCSAN blacklist: 'generic_permission' 'find_next_bit' 'task_dump_owner' 'pipe_wait' 'ktime_get_seconds' '__perf_event_overflow' 'tcp_add_backlog' 'run_timer_softirq' 'ext4_free_inode' 'ext4_has_free_clusters' 'ext4_free_inodes_count' 'filemap_map_pages' 'snd_ctl_notify' 'mem_cgroup_select_victim_node' 'snd_seq_check_queue' 'do_nanosleep' 'poll_schedule_timeout' 'generic_fillattr' 'atime_needs_update' 'taskstats_exit' 'rcu_gp_fqs_check_wake' 'lruvec_lru_size' 'fasync_remove_entry' 'wbt_issue' 'pvclock_gtod_notify' 'exit_signals' 'vti_tunnel_xmit' 'tick_sched_do_timer' 'do_exit' 'kauditd_thread' 'blk_mq_run_hw_queue' 'timer_clear_idle' 'sbitmap_queue_clear' 'blk_mq_get_request' 'd_instantiate_new' 'queue_access_lock' 'yama_ptracer_del' 'ipip_tunnel_xmit' 'osq_lock' '__mark_inode_dirty' 'file_update_time' 'ktime_get_real_seconds' 'pipe_poll' 'mod_timer' 'copy_process' 'xas_find_marked' '__fsnotify_parent' 'pid_update_inode' 'find_get_pages_range_tag' '__add_to_page_cache_locked' '__ip6_datagram_connect' 'p9_poll_workfn' 'bio_endio' 'generic_write_end' 'page_counter_try_charge' 'process_srcu' 'kernfs_refresh_inode' 'shmem_file_read_iter' 'rcu_gp_fqs_loop' 'snd_seq_prioq_cell_out' 'tomoyo_supervisor' 'wbt_done' 'n_tty_receive_buf_common' 'blk_mq_dispatch_rq_list' 'blk_mq_sched_dispatch_requests' 'do_cpu_nanosleep' '__delete_from_page_cache' 'dd_has_work' 'd_delete' '__ext4_new_inode' 'audit_log_start' 'commit_echoes' 'p9_client_cb' 'kvm_arch_vcpu_load' 'ext4_da_write_end' 'shrink_node' 'tick_do_update_jiffies64' 'vm_area_dup' 'ext4_nonda_switch' 'ext4_mark_iloc_dirty' '__snd_rawmidi_transmit_ack' 'ktime_get_with_offset' 'echo_char' 'complete_signal' 'list_lru_count_one' 'ep_poll' 'fsnotify' 'snapshot_refaults' 'calc_wb_limits' 'pcpu_alloc' '__do_page_fault' 'do_syslog' 'kvm_mmu_notifier_invalidate_range_end' '__hrtimer_run_queues' 'common_perm_cond' 'tick_nohz_idle_stop_tick' 'xas_clear_mark' 'mm_update_next_owner' 'add_timer' 'sit_tunnel_xmit' 07:06:39 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=@fragment={0x32, 0x0, 0x6, 0x1}, 0x8) 07:06:39 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) open(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = gettid() getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffe2a) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) gettid() r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040)='security.evm\x00', 0x0, 0x0, 0x0) tkill(r0, 0x5000000000016) [ 352.972710][ T7880] IPVS: ftp: loaded support on port[0] = 21 [ 353.108038][ T7880] chnl_net:caif_netlink_parms(): no params data found [ 353.130264][ T7883] IPVS: ftp: loaded support on port[0] = 21 [ 353.175964][ T7880] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.183326][ T7880] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.192466][ T7880] device bridge_slave_0 entered promiscuous mode [ 353.212830][ T7880] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.222431][ T7880] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.230754][ T7880] device bridge_slave_1 entered promiscuous mode 07:06:39 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000240)=""/21, 0x15) [ 353.283912][ T7880] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 353.310059][ T7880] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 353.334512][ T7883] chnl_net:caif_netlink_parms(): no params data found [ 353.377823][ T7880] team0: Port device team_slave_0 added [ 353.406363][ T7880] team0: Port device team_slave_1 added [ 353.477729][ T7880] device hsr_slave_0 entered promiscuous mode 07:06:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="7400000024000707000000007855bfcfc84c48f7", @ANYRES32=r4, @ANYBLOB="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"], 0x74}}, 0x0) [ 353.545682][ T7880] device hsr_slave_1 entered promiscuous mode [ 353.667940][ T7883] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.675027][ T7883] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.689409][ T7883] device bridge_slave_0 entered promiscuous mode [ 353.713462][ T7888] IPVS: ftp: loaded support on port[0] = 21 [ 353.732831][ T7883] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.762133][ T7883] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.790127][ T7883] device bridge_slave_1 entered promiscuous mode [ 353.881940][ T7892] IPVS: ftp: loaded support on port[0] = 21 [ 353.890219][ T7880] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.897490][ T7880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.904792][ T7880] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.911877][ T7880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.036613][ T7883] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 354.106763][ T7883] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 354.231058][ T7880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 354.247480][ T7884] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.266615][ T7884] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.298238][ T7884] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 354.408274][ T7880] 8021q: adding VLAN 0 to HW filter on device team0 [ 354.438693][ T7883] team0: Port device team_slave_0 added [ 354.450487][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 354.466241][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.490980][ T7888] chnl_net:caif_netlink_parms(): no params data found [ 354.528708][ T7883] team0: Port device team_slave_1 added [ 354.567719][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 354.577734][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.607430][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.614606][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.657376][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 354.666215][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.685582][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.692634][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.721167][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 354.746682][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:06:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) mkdir(0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@can, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/sockstat6\x00RP\x9d\xd7\rF\xbe=\xcb\xe5u\xe1r\x9d\x13\xeb\xff\xb0\x8fx\xb8\x84\x1d~\xb5\x9bX&\x95/D\xeb\xa2\xb2\x8e\xde\x81\xd4\x8e\xad\xfe5>{r\xc21\xbb\xbf\x8b\x93\x83r6\xab\xc9\xf9\xb44%\x8b\x8eI\xc4\x18') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/sockstat6\x00RP\x9d\xd7\rF\xbe=\xcb\xe5u\xe1r\x9d\x13\xeb\xff\xb0\x8fx\xb8\x84\x1d~\xb5\x9bX&\x95/D\xeb\xa2\xb2\x8e\xde\x81\xd4\x8e\xad\xfe5>{r\xc21\xbb\xbf\x8b\x93\x83r6\xab\xc9\xf9\xb44%\x8b\x8eI\xc4\x18') preadv(r3, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@local}}, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) r4 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x882) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0xfcc9}], 0x1, 0x81805) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x19, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x1000, 0x2b4, &(0x7f0000000240)=""/195, 0x0, 0x5, [], r6, 0x86f58c93e74570ed, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6}, 0xffffffffffffff77, 0x10, &(0x7f0000000000)={0x0, 0xfefefffe}, 0x10}, 0x70) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000380)) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) socket$inet_udp(0x2, 0x2, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r7, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r8, 0x80006) sendfile(r7, r8, 0x0, 0x8000fffffffe) [ 354.766379][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 354.786074][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 354.855618][ T7892] chnl_net:caif_netlink_parms(): no params data found [ 354.868376][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 354.898838][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 354.926435][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 354.958015][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 354.986328][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.017711][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 355.046753][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.127804][ T7883] device hsr_slave_0 entered promiscuous mode [ 355.175856][ T7883] device hsr_slave_1 entered promiscuous mode [ 355.225393][ T7883] debugfs: Directory 'hsr0' with parent '/' already present! [ 355.233677][ T7880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 355.283374][ T7920] IPVS: ftp: loaded support on port[0] = 21 [ 355.295056][ T7888] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.338148][ T7888] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.365659][ T7888] device bridge_slave_0 entered promiscuous mode [ 355.386046][ T7888] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.393217][ T7888] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.405522][ T7888] device bridge_slave_1 entered promiscuous mode [ 355.499301][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 355.518019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 355.545068][ T7880] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 355.579607][ T7888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 355.640334][ T7892] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.665507][ T7892] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.695568][ T7892] device bridge_slave_0 entered promiscuous mode [ 355.721614][ T7888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 355.771102][ T7892] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.782162][ T7892] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.818783][ T7892] device bridge_slave_1 entered promiscuous mode [ 355.858443][ T7920] chnl_net:caif_netlink_parms(): no params data found [ 355.978164][ T7892] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 356.016786][ T7888] team0: Port device team_slave_0 added [ 356.055969][ T7883] 8021q: adding VLAN 0 to HW filter on device bond0 [ 356.081727][ T7892] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 356.105785][ T7888] team0: Port device team_slave_1 added [ 356.123841][ T7883] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.149755][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.164460][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.191195][ T7920] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.202908][ T7920] bridge0: port 1(bridge_slave_0) entered disabled state 07:06:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x3e9) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) dup2(r3, r4) setsockopt$inet_mreqn(r4, 0x0, 0x23, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 356.236659][ T7920] device bridge_slave_0 entered promiscuous mode 07:06:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 356.316822][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.326725][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.358588][ T7895] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.365940][ T7895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.418225][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.466037][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.474510][ T7895] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.481571][ T7895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.523233][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 356.551406][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 356.581349][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 356.606532][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.638660][ T7920] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.649133][ T7920] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.672377][ T7920] device bridge_slave_1 entered promiscuous mode 07:06:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x12, r4, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000000)="460f070f20c035080000000f22c00c01c4c4412966f8f3c7f8996da09043ddbe00200000c4a25d8e97eb75f3410f01b2741706c60fc75e030f09", 0x3a}], 0x1, 0x20, &(0x7f00000003c0)=[@flags], 0x1) semctl$SETVAL(0x0, 0x4, 0x10, &(0x7f00000001c0)=0x5) [ 356.701317][ T7883] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 356.775940][ T7883] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 356.816582][ T7892] team0: Port device team_slave_0 added [ 356.819244][ C1] hrtimer: interrupt took 35620 ns [ 356.822414][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 356.836892][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 356.845081][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 356.899364][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 356.918939][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 356.928997][ T7969] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 356.966260][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.975018][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 357.036124][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.050572][ T7965] IPVS: ftp: loaded support on port[0] = 21 [ 357.107848][ T7888] device hsr_slave_0 entered promiscuous mode [ 357.145808][ T7888] device hsr_slave_1 entered promiscuous mode [ 357.215567][ T7888] debugfs: Directory 'hsr0' with parent '/' already present! [ 357.279068][ T7892] team0: Port device team_slave_1 added [ 357.390579][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 357.409673][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 357.462231][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 357.520834][ T7883] 8021q: adding VLAN 0 to HW filter on device batadv0 07:06:44 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x12, r4, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000000)="460f070f20c035080000000f22c00c01c4c4412966f8f3c7f8996da09043ddbe00200000c4a25d8e97eb75f3410f01b2741706c60fc75e030f09", 0x3a}], 0x1, 0x20, &(0x7f00000003c0)=[@flags], 0x1) semctl$SETVAL(0x0, 0x4, 0x10, &(0x7f00000001c0)=0x5) [ 357.608067][ T7892] device hsr_slave_0 entered promiscuous mode [ 357.645843][ T7892] device hsr_slave_1 entered promiscuous mode [ 357.722665][ T7892] debugfs: Directory 'hsr0' with parent '/' already present! [ 357.762026][ T7920] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 357.869286][ T7920] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 358.137066][ T7888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.144935][ T7920] team0: Port device team_slave_0 added [ 358.181263][ T7920] team0: Port device team_slave_1 added [ 358.246787][ T7915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.254903][ T7915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.322313][ T7888] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.391453][ T7892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.478325][ T7920] device hsr_slave_0 entered promiscuous mode 07:06:45 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) open(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = gettid() getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffe2a) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) gettid() r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040)='security.evm\x00', 0x0, 0x0, 0x0) tkill(r0, 0x5000000000016) [ 358.575886][ T7920] device hsr_slave_1 entered promiscuous mode [ 358.675496][ T7920] debugfs: Directory 'hsr0' with parent '/' already present! [ 358.686016][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.694913][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.816421][ T8009] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.823497][ T8009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.901031][ T7892] 8021q: adding VLAN 0 to HW filter on device team0 [ 359.018422][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.088751][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 359.143687][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:06:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {0x0}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 359.225933][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 359.350084][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.435822][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.442908][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.569435][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 359.614457][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 359.705567][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 359.750943][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 359.802217][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 359.858681][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 07:06:46 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpid() r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000440)}, 0x20) [ 359.923709][ T7965] chnl_net:caif_netlink_parms(): no params data found [ 359.969561][ T7888] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 360.052879][ T7888] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 360.136292][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 360.169304][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 360.233819][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 360.300951][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.389399][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:06:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(0x0, 0x3c) r3 = memfd_create(&(0x7f0000000080)='/dev/aut*Sofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x12, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/dev_mcast\x00') syz_open_procfs(0x0, &(0x7f00000000c0)='\xf8C\t/\xee\x91I;\x0e\x98\x8b\xff\xb3Y\x137\xbc][[8\x05-\x9a\x95n\xee<{\x11\xaa\xdd\x00\x00\x00\x00\x00\x00\x00\xf4=\x8f\xf4\x19 \xb9\xa9\xe8\x99\xa6S\xbe\xa3\xc0\x147?t\xc1\x97\x8b\x1f\xe7+\xea\xc7\xfa\x14\xde\xb2G7 b\"\xc5}\x86u\xef\x02\xe1\x81A\xe6(\x7f $\x85I\x91\xc9\xae\x86\xda\t\xf8\xab)\x98m\x80^\xaa\x10-\x03\xe2?\xa7\xdc\xfe\xb7k\x9cmz*\xbb\x05\x80\xc1Ee\x1f\x00'/142) [ 360.459446][ T8009] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.466573][ T8009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.531482][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 360.604937][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 360.683928][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 07:06:47 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) r2 = dup(r0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) lseek(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x1bb8, 0x4) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0xc3, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000001c0)="10000040060000000000000000000000b22025285db74192e7576d9062ec6e2fe8ffff3ff248691861d03a71091d334252afb1af5b8f0274c2ed58338226131291198f3d70dcf797ac42d0eeed042c06b56b89f02f92b12ebe4c45948a362a76def2f4955f100a13131f474b140942110257e173cea102775e1b3873ebf98dac6421f6d449544114b8ce29f4b48d1738b5be127a96f24c9d3c130e1a6c2eb5b3f12eb6a1f5051594545cbb895e65d83c08d2d6cd56694e5a6c00f54aceaf498f57b2a56634a23ae7", 0x40000010}]) io_setup(0x7ff, &(0x7f0000000040)) io_setup(0x1, &(0x7f0000000080)=0x0) io_getevents(r5, 0x7e, 0x5, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) clock_gettime(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r6, r6) write$vhci(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x24e) ftruncate(r3, 0x80003) sendfile(r2, r3, &(0x7f0000000100), 0x8000fffffffe) [ 360.764072][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.851411][ T8009] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.858521][ T8009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.151753][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.161833][ T8090] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 361.207006][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 361.215016][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.344786][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.417798][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.490600][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.553222][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.631813][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.693104][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.790355][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.872628][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 361.935549][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 361.947894][ T7892] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 362.001175][ T7892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.112071][ T7888] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.137771][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.158517][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.226024][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.291424][ T7965] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.320535][ T8032] ================================================================== [ 362.328671][ T8032] BUG: KCSAN: data-race in inode_permission / inode_permission [ 362.336195][ T8032] [ 362.338518][ T8032] read to 0xffff8880b6835aca of 2 bytes by task 8036 on cpu 1: [ 362.346054][ T8032] inode_permission+0x4e/0x3c0 [ 362.350826][ T8032] may_open.isra.0+0x144/0x250 [ 362.355581][ T8032] path_openat+0xf05/0x36e0 [ 362.360069][ T8032] do_filp_open+0x11e/0x1b0 [ 362.364558][ T8032] do_sys_open+0x3b3/0x4f0 [ 362.368974][ T8032] __x64_sys_open+0x55/0x70 [ 362.373469][ T8032] do_syscall_64+0xcc/0x370 [ 362.377968][ T8032] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 362.383839][ T8032] [ 362.386170][ T8032] write to 0xffff8880b6835aca of 2 bytes by task 8032 on cpu 0: [ 362.393793][ T8032] inode_permission+0x3a1/0x3c0 [ 362.398636][ T8032] may_open.isra.0+0x144/0x250 [ 362.403389][ T8032] path_openat+0xf05/0x36e0 [ 362.407876][ T8032] do_filp_open+0x11e/0x1b0 [ 362.412365][ T8032] do_sys_open+0x3b3/0x4f0 [ 362.416780][ T8032] __x64_sys_open+0x55/0x70 [ 362.421275][ T8032] do_syscall_64+0xcc/0x370 [ 362.425775][ T8032] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 362.431644][ T8032] [ 362.433957][ T8032] Reported by Kernel Concurrency Sanitizer on: [ 362.441139][ T8032] CPU: 0 PID: 8032 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 362.447900][ T8032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.457939][ T8032] ================================================================== [ 362.466506][ T8032] Kernel panic - not syncing: panic_on_warn set ... [ 362.473169][ T8032] CPU: 0 PID: 8032 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 362.479913][ T8032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.489952][ T8032] Call Trace: [ 362.493240][ T8032] dump_stack+0xf5/0x159 [ 362.497476][ T8032] panic+0x210/0x640 [ 362.501366][ T8032] ? vprintk_func+0x8d/0x140 [ 362.505961][ T8032] kcsan_report.cold+0xc/0xe [ 362.510551][ T8032] kcsan_setup_watchpoint+0x3fe/0x410 [ 362.515923][ T8032] __tsan_unaligned_write2+0x143/0x1f0 [ 362.521378][ T8032] inode_permission+0x3a1/0x3c0 [ 362.526233][ T8032] may_open.isra.0+0x144/0x250 [ 362.531031][ T8032] path_openat+0xf05/0x36e0 [ 362.535549][ T8032] do_filp_open+0x11e/0x1b0 [ 362.540071][ T8032] ? __alloc_fd+0x2ef/0x3b0 [ 362.544574][ T8032] do_sys_open+0x3b3/0x4f0 [ 362.549259][ T8032] __x64_sys_open+0x55/0x70 [ 362.553767][ T8032] do_syscall_64+0xcc/0x370 [ 362.558277][ T8032] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 362.564264][ T8032] RIP: 0033:0x7fcf8d5f7120 [ 362.568680][ T8032] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 362.588295][ T8032] RSP: 002b:00007ffe20b6e818 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 362.596723][ T8032] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fcf8d5f7120 [ 362.604698][ T8032] RDX: 00007ffe20b6e852 RSI: 0000000000000000 RDI: 00007ffe20b6e840 [ 362.613037][ T8032] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007fcf8d8bf55f [ 362.621006][ T8032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001d11220 [ 362.629788][ T8032] R13: 0000000000000020 R14: 00007fcf8dcac010 R15: 0000000000000000 [ 362.639332][ T8032] Kernel Offset: disabled [ 362.643748][ T8032] Rebooting in 86400 seconds..