[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.616448][ T26] audit: type=1800 audit(1571915673.065:25): pid=7071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 36.643617][ T26] audit: type=1800 audit(1571915673.065:26): pid=7071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 36.670533][ T26] audit: type=1800 audit(1571915673.065:27): pid=7071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.151' (ECDSA) to the list of known hosts. 2019/10/24 11:14:42 fuzzer started 2019/10/24 11:14:44 dialing manager at 10.128.0.105:42135 2019/10/24 11:14:44 syscalls: 2524 2019/10/24 11:14:44 code coverage: enabled 2019/10/24 11:14:44 comparison tracing: enabled 2019/10/24 11:14:44 extra coverage: extra coverage is not supported by the kernel 2019/10/24 11:14:44 setuid sandbox: enabled 2019/10/24 11:14:44 namespace sandbox: enabled 2019/10/24 11:14:44 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/24 11:14:44 fault injection: enabled 2019/10/24 11:14:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/24 11:14:44 net packet injection: enabled 2019/10/24 11:14:44 net device setup: enabled 2019/10/24 11:14:44 concurrency sanitizer: enabled syzkaller login: [ 55.440904][ T7238] KCSAN: could not find function: 'poll_schedule_timeout' 2019/10/24 11:15:00 adding functions to KCSAN blacklist: 'fsnotify' 'do_nanosleep' 'blk_mq_sched_dispatch_requests' 'dd_has_work' 'padata_find_next' 'mm_update_next_owner' '__perf_event_overflow' 'ktime_get_real_seconds' 'taskstats_exit' '__snd_rawmidi_transmit_ack' 'do_readlinkat' 'atime_needs_update' '__dev_queue_xmit' 'tick_do_update_jiffies64' 'tcp_add_backlog' 'ext4_free_inode' 'update_defense_level' 'pid_update_inode' 'blk_mq_dispatch_rq_list' 'ipip_tunnel_xmit' '__filemap_fdatawrite_range' 'vti_tunnel_xmit' 'ep_poll' 'tcp_poll' 'find_get_pages_range_tag' 'rcu_gp_fqs_check_wake' 'mod_timer' 'tick_sched_do_timer' 'kernfs_refresh_inode' 'snapshot_refaults' 'task_dump_owner' 'ktime_get_seconds' 'get_task_cred' 'add_timer' 'poll_schedule_timeout' 'run_timer_softirq' 'xas_find_marked' 'add_timer_on' 'timer_clear_idle' 'generic_write_end' 'sk_wait_data' 'install_new_memslots' 'mem_cgroup_select_victim_node' 'ext4_mb_good_group' 'ext4_has_free_clusters' 'tomoyo_supervisor' 'wbt_issue' 'blk_mq_get_request' 'rcu_gp_fqs_loop' 'find_next_bit' '__splice_from_pipe' '__skb_try_recv_from_queue' 'copy_process' '__tcp_select_window' 'process_srcu' '__mark_inode_dirty' 'blk_mq_run_hw_queue' 'do_exit' 'ext4_nonda_switch' 'bio_endio' 'tick_nohz_idle_stop_tick' 'balance_dirty_pages' 'osq_lock' 'p9_poll_workfn' 'sit_tunnel_xmit' 'ext4_writepages' 'shmem_file_read_iter' 'ext4_mark_iloc_dirty' '__hrtimer_run_queues' 'generic_permission' '__nf_ct_refresh_acct' 'ext4_da_write_end' '__alloc_file' 'ext4_free_inodes_count' 'icmp_global_allow' 'pipe_poll' 'l2tp_tunnel_del_work' 'vm_area_dup' '__ext4_new_inode' 'generic_fillattr' 11:18:39 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="2caf"], 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x3b24, &(0x7f0000000740)=0x0) setresuid(0x0, 0x0, 0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 11:18:39 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usag%_percpu_u|\"w\x90\xf6\x1c\x98ser\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) creat(&(0x7f0000000000)='./file1\x00', 0xaddfcb1766a94d32) r1 = socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000140)={0xffffffffffffffff}) close(r2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(0x0, 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r3, &(0x7f0000000d00), 0x1116811, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) close(r1) [ 282.815747][ T7245] IPVS: ftp: loaded support on port[0] = 21 [ 282.938396][ T7245] chnl_net:caif_netlink_parms(): no params data found [ 283.037702][ T7245] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.046666][ T7245] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.055785][ T7245] device bridge_slave_0 entered promiscuous mode [ 283.071383][ T7248] IPVS: ftp: loaded support on port[0] = 21 [ 283.078659][ T7245] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.086438][ T7245] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.100965][ T7245] device bridge_slave_1 entered promiscuous mode 11:18:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, 0x0) writev(r1, &(0x7f0000000080), 0x5b) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) munmap(&(0x7f0000000000/0x1000)=nil, 0x1000) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 283.144352][ T7245] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 283.165453][ T7245] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 283.211272][ T7245] team0: Port device team_slave_0 added [ 283.240964][ T7245] team0: Port device team_slave_1 added [ 283.365442][ T7245] device hsr_slave_0 entered promiscuous mode 11:18:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000017c0)=[{{&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000001600)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@pktinfo={{0x24, 0x29, 0x32, {@local}}}], 0x28}}], 0x2, 0x0) [ 283.433537][ T7245] device hsr_slave_1 entered promiscuous mode [ 283.485688][ T7248] chnl_net:caif_netlink_parms(): no params data found [ 283.532895][ T7252] IPVS: ftp: loaded support on port[0] = 21 [ 283.570302][ T7245] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.577537][ T7245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.584971][ T7245] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.592019][ T7245] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.612271][ T7248] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.633053][ T7248] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.653967][ T7248] device bridge_slave_0 entered promiscuous mode [ 283.680024][ T7248] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.692541][ T7248] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.700522][ T7248] device bridge_slave_1 entered promiscuous mode [ 283.721473][ T7254] IPVS: ftp: loaded support on port[0] = 21 [ 283.771915][ T7248] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 283.783425][ T7248] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 283.809567][ T7248] team0: Port device team_slave_0 added [ 283.845350][ T7248] team0: Port device team_slave_1 added 11:18:40 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usag%_percpu_u|\"w\x90\xf6\x1c\x98ser\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) creat(&(0x7f0000000000)='./file1\x00', 0xaddfcb1766a94d32) r1 = socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)=0x3f) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r3, &(0x7f0000000d00), 0x1116811, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xa312, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) close(r1) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) [ 283.921964][ T7245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.016066][ T7248] device hsr_slave_0 entered promiscuous mode [ 284.054249][ T7248] device hsr_slave_1 entered promiscuous mode [ 284.094027][ T7248] debugfs: Directory 'hsr0' with parent '/' already present! [ 284.102276][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.121749][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.131578][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 284.171138][ T7257] IPVS: ftp: loaded support on port[0] = 21 [ 284.199192][ T7245] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.212324][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.220871][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.248079][ T7252] chnl_net:caif_netlink_parms(): no params data found 11:18:40 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000900)="c9674bda23f8ea210d5dfde5fa1eb4839f2bdc382a2c1b88dd89661f97f1e81a8e5acd481d623f520faa747c84237b9fda1832928f3a2a5824df8764de405fa531d51e2bf023a4982a3967177c09e5de840c269bb7b16c587e9799437dd09d41add7b8d1fffca3ff80b32b8265e4eb61b5de74c79399b0878eb063f49ca53f94ffd12faa3403219313a6788a789403d37fc9f2adc101cceb093639bb3b1e85392fcbb95ecc049c0ac9c69b1b49bd9027316ee7b66e46be8cbfb8623d5d3b844baa6fb237fdd7b5c4f532c49f406c9474cdc4b6a4f918d770db55e0954f969f3e71cdf7f665496a8c528f7f21a4c229015068e164ee87bf428133ebc9bc92d6f55e1fc81e3f8ffcb8355d95946692c5dae153916ae9bb5a76b8bac9656448225603532370e3fac8e0d16d5b30b98f222b855df8f37fa18fd805f8760cb5ebe2757c1b5381e6ec75fa9145eb5910488d977fce32820725f208d8aa9570768827f80c6c73f9923ccc912a163123afcff9d2dabb345c03c5136641ffd32bf2f0766c6412b3501c792eacde2ceccd76c32e5cd2c34b1775cf9e0b77ba002db50c6355d64a544ee9bdb5703e602299baab85cea0e5541a82e502e0f82033fa0a42df8d421842bf8d369c68239018ed574ee78d8a52ef5cb5aa4df0138394f66984be9ca0f716209773fd87a4885908c4c8a008ab9f4d8336dcc0b0685ef25a4e0b1bde", 0x200}]) [ 284.265071][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.274567][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.285218][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.292336][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.301471][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.312226][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.321564][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.328681][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.339436][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 284.417693][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 284.429324][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 284.438870][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.450986][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 284.500245][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 284.511674][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.532945][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 284.541671][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.550572][ T7252] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.557714][ T7252] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.565820][ T7252] device bridge_slave_0 entered promiscuous mode [ 284.577013][ T7252] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.580809][ T7261] IPVS: ftp: loaded support on port[0] = 21 [ 284.584236][ T7252] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.600657][ T7252] device bridge_slave_1 entered promiscuous mode [ 284.614771][ T7254] chnl_net:caif_netlink_parms(): no params data found [ 284.643358][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 284.652387][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.668668][ T7245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 284.680927][ T7252] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 284.695178][ T7252] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 284.746185][ T7252] team0: Port device team_slave_0 added [ 284.754761][ T7254] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.761832][ T7254] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.769860][ T7254] device bridge_slave_0 entered promiscuous mode [ 284.780530][ T7254] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.790175][ T7254] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.798571][ T7254] device bridge_slave_1 entered promiscuous mode [ 284.811484][ T7252] team0: Port device team_slave_1 added [ 284.824915][ T7245] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 284.851573][ T7248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.927102][ T7252] device hsr_slave_0 entered promiscuous mode [ 284.972905][ T7252] device hsr_slave_1 entered promiscuous mode [ 285.012920][ T7252] debugfs: Directory 'hsr0' with parent '/' already present! [ 285.049018][ T7248] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.052547][ C0] ================================================================== [ 285.063735][ C0] BUG: KCSAN: data-race in wq_watchdog_reset_touched / wq_watchdog_touch [ 285.071217][ T7248] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 285.072147][ C0] [ 285.082501][ T7248] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 285.084783][ C0] write to 0xffff88812bf172c8 of 8 bytes by task 7248 on cpu 1: [ 285.103826][ C0] wq_watchdog_touch+0x61/0xae [ 285.104309][ T7248] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 285.108602][ C0] touch_softlockup_watchdog+0x2a/0x40 [ 285.120800][ C0] wait_for_xmitr+0x6f/0x1b0 [ 285.125392][ C0] serial8250_console_putchar+0x28/0x50 [ 285.130351][ T7257] chnl_net:caif_netlink_parms(): no params data found [ 285.130946][ C0] uart_console_write+0x9b/0xd0 [ 285.142637][ C0] serial8250_console_write+0x3a0/0x500 [ 285.148184][ C0] univ8250_console_write+0x47/0x60 [ 285.153380][ C0] console_unlock+0x935/0xb80 [ 285.158084][ C0] vprintk_emit+0x38f/0x4e0 [ 285.162587][ C0] vprintk_default+0x31/0x50 [ 285.167173][ C0] vprintk_func+0x85/0x140 [ 285.169786][ T7257] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.171599][ C0] printk+0x69/0x91 [ 285.178920][ T7257] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.182408][ C0] vlan_device_event.cold+0x18/0x2c [ 285.190927][ T7257] device bridge_slave_0 entered promiscuous mode [ 285.194591][ C0] notifier_call_chain+0xd7/0x160 [ 285.194594][ C0] [ 285.194607][ C0] write to 0xffff88812bf172c8 of 8 bytes by interrupt on cpu 0: [ 285.194635][ C0] wq_watchdog_reset_touched+0x8c/0xe0 [ 285.202625][ T7257] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.205992][ C0] wq_watchdog_timer_fn+0x270/0x2b0 [ 285.208420][ T7257] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.216191][ C0] call_timer_fn+0x5f/0x2f0 [ 285.216204][ C0] run_timer_softirq+0x912/0xd20 [ 285.216218][ C0] __do_softirq+0x115/0x33f [ 285.216230][ C0] irq_exit+0xbb/0xe0 [ 285.216260][ C0] smp_apic_timer_interrupt+0xe6/0x280 [ 285.223098][ T7257] device bridge_slave_1 entered promiscuous mode [ 285.228724][ C0] apic_timer_interrupt+0xf/0x20 [ 285.249495][ T7257] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 285.250444][ C0] mutex_spin_on_owner+0x15d/0x1a0 [ 285.256787][ T7257] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 285.259004][ C0] __mutex_lock.isra.0+0x3ab/0x740 [ 285.259016][ C0] __mutex_lock_slowpath+0x1f/0x30 [ 285.259026][ C0] mutex_lock+0x2d/0x40 [ 285.259039][ C0] rtnl_lock+0x1e/0x30 [ 285.259041][ C0] [ 285.259045][ C0] Reported by Kernel Concurrency Sanitizer on: [ 285.259058][ C0] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.4.0-rc3+ #0 [ 285.259077][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.279438][ T7257] team0: Port device team_slave_0 added [ 285.285748][ C0] Workqueue: ipv6_addrconf addrconf_dad_work [ 285.285756][ C0] ================================================================== [ 285.285763][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 285.285777][ C0] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.4.0-rc3+ #0 [ 285.285784][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.285794][ C0] Workqueue: ipv6_addrconf addrconf_dad_work [ 285.285800][ C0] Call Trace: [ 285.285806][ C0] [ 285.285823][ C0] dump_stack+0xf5/0x159 [ 285.285836][ C0] panic+0x210/0x640 [ 285.285850][ C0] ? mutex_spin_on_owner+0x15d/0x1a0 [ 285.285877][ C0] ? vprintk_func+0x8d/0x140 [ 285.292366][ T7257] team0: Port device team_slave_1 added [ 285.300080][ C0] kcsan_report.cold+0xc/0x10 [ 285.300096][ C0] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 285.300111][ C0] __tsan_write8+0x32/0x40 [ 285.300139][ C0] wq_watchdog_reset_touched+0x8c/0xe0 [ 285.448301][ C0] wq_watchdog_timer_fn+0x270/0x2b0 [ 285.453582][ C0] ? show_workqueue_state+0x220/0x220 [ 285.458951][ C0] call_timer_fn+0x5f/0x2f0 [ 285.463871][ C0] ? show_workqueue_state+0x220/0x220 [ 285.469411][ C0] ? show_workqueue_state+0x220/0x220 [ 285.474901][ C0] run_timer_softirq+0x912/0xd20 [ 285.480983][ C0] ? sched_clock+0x34/0x40 [ 285.485425][ C0] ? sched_clock_cpu+0x15/0xe0 [ 285.490183][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.496418][ C0] __do_softirq+0x115/0x33f [ 285.501708][ C0] irq_exit+0xbb/0xe0 [ 285.505679][ C0] smp_apic_timer_interrupt+0xe6/0x280 [ 285.511156][ C0] apic_timer_interrupt+0xf/0x20 [ 285.516093][ C0] [ 285.519022][ C0] RIP: 0010:mutex_spin_on_owner+0x15d/0x1a0 [ 285.524909][ C0] Code: 41 5d 41 5e 41 5f 5d c3 48 8d 75 c8 ba 08 00 00 00 4c 89 ef e8 d4 fc ff ff 48 8d 7d c8 e8 8b b2 1c 00 f6 45 c8 01 75 b2 f3 90 e2 fe ff ff 49 8d 7d 20 ba 08 00 00 00 48 8d 75 c8 e8 ac fc ff [ 285.545014][ C0] RSP: 0018:ffffc90000c93c10 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 285.553411][ C0] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 00000000000004c3 [ 285.561453][ C0] RDX: 00000000630d1610 RSI: 020c49ba5e353f7d RDI: 0000000000000001 [ 285.569403][ C0] RBP: ffffc90000c93c50 R08: 0000000000000000 R09: 0000ffff85a56537 [ 285.577788][ C0] R10: 00000000aaaaaaab R11: ffffffff86045cc8 R12: ffff8880b49c6040 [ 285.585759][ C0] R13: ffffffff85bfbde0 R14: 0000000000000000 R15: ffff88812b35d000 [ 285.593750][ C0] __mutex_lock.isra.0+0x3ab/0x740 [ 285.598851][ C0] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 285.604492][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 285.610368][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.616597][ C0] __mutex_lock_slowpath+0x1f/0x30 [ 285.621687][ C0] mutex_lock+0x2d/0x40 [ 285.625821][ C0] rtnl_lock+0x1e/0x30 [ 285.629873][ C0] addrconf_dad_work+0x61/0xae0 [ 285.634705][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 285.640619][ C0] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 285.646244][ C0] process_one_work+0x3d4/0x890 [ 285.651089][ C0] worker_thread+0xa0/0x800 [ 285.655576][ C0] kthread+0x1d4/0x200 [ 285.659625][ C0] ? rescuer_thread+0x6a0/0x6a0 [ 285.664451][ C0] ? kthread_stop+0x2d0/0x2d0 [ 285.669114][ C0] ret_from_fork+0x1f/0x30 [ 285.674918][ C0] Kernel Offset: disabled [ 285.679263][ C0] Rebooting in 86400 seconds..