[ 53.878666][ T26] audit: type=1800 audit(1572960155.195:25): pid=7879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 53.922004][ T26] audit: type=1800 audit(1572960155.205:26): pid=7879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 53.958513][ T26] audit: type=1800 audit(1572960155.205:27): pid=7879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 54.002264][ T26] audit: type=1800 audit(1572960155.205:28): pid=7879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.3' (ECDSA) to the list of known hosts. 2019/11/05 13:22:43 fuzzer started 2019/11/05 13:22:45 dialing manager at 10.128.0.105:39277 2019/11/05 13:22:45 syscalls: 2553 2019/11/05 13:22:45 code coverage: enabled 2019/11/05 13:22:45 comparison tracing: enabled 2019/11/05 13:22:45 extra coverage: extra coverage is not supported by the kernel 2019/11/05 13:22:45 setuid sandbox: enabled 2019/11/05 13:22:45 namespace sandbox: enabled 2019/11/05 13:22:45 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 13:22:45 fault injection: enabled 2019/11/05 13:22:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 13:22:45 net packet injection: enabled 2019/11/05 13:22:45 net device setup: enabled 2019/11/05 13:22:45 concurrency sanitizer: enabled 2019/11/05 13:22:45 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 65.984524][ T8046] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/05 13:22:54 adding functions to KCSAN blacklist: 'timer_clear_idle' 'blk_mq_dispatch_rq_list' 'ktime_get_seconds' 'list_lru_count_one' 'snapshot_refaults' 'wbt_done' 'tick_nohz_idle_stop_tick' 'generic_fillattr' 'echo_char' '__hrtimer_run_queues' 'task_dump_owner' 'pipe_poll' 'generic_write_end' 'page_counter_try_charge' 'poll_schedule_timeout' 'do_nanosleep' 'kauditd_thread' 'queue_access_lock' 'ep_insert' '__ext4_new_inode' 'vm_area_dup' 'blk_mq_sched_dispatch_requests' 'blk_mq_get_request' 'atime_needs_update' 'mem_cgroup_select_victim_node' 'ktime_get_real_seconds' 'generic_permission' 'do_exit' 'dd_has_work' 'do_syslog' 'xas_find_marked' 'xas_clear_mark' 'n_tty_receive_buf_common' 'ext4_has_free_clusters' 'list_lru_add' 'tcp_add_backlog' 'pid_update_inode' 'tick_do_update_jiffies64' 'rcu_gp_fqs_check_wake' 'find_next_bit' 'ext4_nonda_switch' 'ext4_free_inodes_count' 'kvm_arch_vcpu_load' 'get_wchan' 'ep_poll' 'copy_process' '__skb_try_recv_from_queue' 'audit_log_start' 'tick_sched_do_timer' 'taskstats_exit' 'rcu_gp_fqs_loop' 'p9_poll_workfn' 'ext4_free_inode' 'enqueue_timer' 'inet_putpeer' 'tomoyo_supervisor' 'run_timer_softirq' 13:24:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) dup2(r2, r3) 13:24:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f000018efdc)="240000005a001f0214f9f407000904fcffffff1010000400feffffff0800000000000000", 0x24) [ 169.748750][ T8050] IPVS: ftp: loaded support on port[0] = 21 [ 169.843878][ T8052] IPVS: ftp: loaded support on port[0] = 21 13:24:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0xffffff15) rt_sigaction(0x2000019, 0x0, 0x0, 0xfffffffffffffde4, &(0x7f00000001c0)) socket(0x0, 0x80002, 0x7) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0xfffffffffffffffd) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xa47eee4f77827c38) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', r2}) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x82, &(0x7f0000000000)=@assoc_value, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0xff}, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000000)=@assoc_value, 0x8) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0xd48a5a656600d03e) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 169.906487][ T8050] chnl_net:caif_netlink_parms(): no params data found [ 169.947930][ T8050] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.962442][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.980300][ T8050] device bridge_slave_0 entered promiscuous mode [ 170.005896][ T8050] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.021980][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.029911][ T8050] device bridge_slave_1 entered promiscuous mode [ 170.068305][ T8050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.109116][ T8050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.131427][ T8056] IPVS: ftp: loaded support on port[0] = 21 [ 170.135131][ T8052] chnl_net:caif_netlink_parms(): no params data found [ 170.164738][ T8050] team0: Port device team_slave_0 added [ 170.186247][ T8050] team0: Port device team_slave_1 added 13:24:31 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESHEX], 0x227) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x10, 0xa198) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, 0x0) [ 170.267197][ T8050] device hsr_slave_0 entered promiscuous mode [ 170.382323][ T8050] device hsr_slave_1 entered promiscuous mode 13:24:31 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) [ 170.438563][ T8052] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.446428][ T8052] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.455503][ T8052] device bridge_slave_0 entered promiscuous mode [ 170.490755][ T8058] IPVS: ftp: loaded support on port[0] = 21 [ 170.510043][ T8052] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.532100][ T8052] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.546029][ T8052] device bridge_slave_1 entered promiscuous mode [ 170.697729][ T8050] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.704883][ T8050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.712328][ T8050] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.719367][ T8050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.843805][ T8052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.867486][ T8056] chnl_net:caif_netlink_parms(): no params data found [ 170.897489][ T8052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.934319][ T2891] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.975783][ T2891] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.067197][ T8084] IPVS: ftp: loaded support on port[0] = 21 [ 171.145115][ T8052] team0: Port device team_slave_0 added [ 171.159384][ T8056] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.192373][ T8056] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.204343][ T8056] device bridge_slave_0 entered promiscuous mode [ 171.241429][ T8050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.279792][ T8052] team0: Port device team_slave_1 added [ 171.288819][ T8056] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.296432][ T8056] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.332746][ T8056] device bridge_slave_1 entered promiscuous mode [ 171.363409][ T8050] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.396676][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.412750][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:24:32 executing program 5: r0 = io_uring_setup(0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_enter(r0, 0x0, 0x7f, 0x3, &(0x7f0000000080), 0x8) [ 171.449260][ T8058] chnl_net:caif_netlink_parms(): no params data found [ 171.556370][ T8052] device hsr_slave_0 entered promiscuous mode [ 171.612298][ T8052] device hsr_slave_1 entered promiscuous mode [ 171.652033][ T8052] debugfs: Directory 'hsr0' with parent '/' already present! [ 171.662147][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.670940][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.714382][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.721450][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.809255][ T8056] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.868440][ T8050] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 171.901942][ T8050] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 171.947433][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.965495][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.995298][ T8081] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.002442][ T8081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.065127][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.094273][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 172.133257][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.145739][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.175998][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.195696][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.215746][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.255761][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.266977][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.292782][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.333111][ T8056] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.347083][ T8089] IPVS: ftp: loaded support on port[0] = 21 [ 172.370469][ T8050] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.386800][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.395685][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.407141][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 172.414954][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 172.517071][ T8058] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.525314][ T8058] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.542947][ T8058] device bridge_slave_0 entered promiscuous mode [ 172.566394][ T8056] team0: Port device team_slave_0 added [ 172.593089][ T8056] team0: Port device team_slave_1 added [ 172.603349][ T8058] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.610404][ T8058] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.645575][ T8058] device bridge_slave_1 entered promiscuous mode [ 172.744323][ T8056] device hsr_slave_0 entered promiscuous mode [ 172.792409][ T8056] device hsr_slave_1 entered promiscuous mode [ 172.831978][ T8056] debugfs: Directory 'hsr0' with parent '/' already present! [ 172.894667][ T8084] chnl_net:caif_netlink_parms(): no params data found [ 172.985062][ T8058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.059177][ T8052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.108674][ T8058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.236346][ T8084] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.276293][ T8084] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.335824][ T8084] device bridge_slave_0 entered promiscuous mode [ 173.417155][ T8052] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.474132][ T8084] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.481215][ T8084] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.515520][ T8084] device bridge_slave_1 entered promiscuous mode [ 173.564322][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.576149][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.623435][ T8058] team0: Port device team_slave_0 added [ 173.642327][ T8089] chnl_net:caif_netlink_parms(): no params data found 13:24:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) dup2(r2, r3) [ 173.740444][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.772997][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.817277][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.824372][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.905647][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.946962][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.969860][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.976960][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.036976][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.083397][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.121481][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.157237][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.196313][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.232771][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.268030][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.305970][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.344109][ T8058] team0: Port device team_slave_1 added [ 174.355941][ T8084] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.396999][ T8056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.456550][ T8052] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 174.495050][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.538125][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.582949][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.591456][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 13:24:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) dup2(r2, r3) [ 174.655357][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.715178][ T8084] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.777063][ T8056] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.830308][ T8052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.901857][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.911030][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.956712][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 174.996799][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 13:24:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) dup2(r2, r3) [ 175.089377][ T8058] device hsr_slave_0 entered promiscuous mode [ 175.152364][ T8058] device hsr_slave_1 entered promiscuous mode [ 175.212239][ T8058] debugfs: Directory 'hsr0' with parent '/' already present! [ 175.223210][ T8084] team0: Port device team_slave_0 added [ 175.243515][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.263401][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.302296][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.309367][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.362619][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.392422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.409526][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.416627][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.452676][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.487460][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.549439][ T8089] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.562518][ T8089] bridge0: port 1(bridge_slave_0) entered disabled state 13:24:36 executing program 0: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x23c) write(r0, &(0x7f00000000c0)="1f0000000104ff01004354c007110000f30501000a000100020423dcffdf00", 0x1f) [ 175.606478][ T8089] device bridge_slave_0 entered promiscuous mode [ 175.622739][ T8084] team0: Port device team_slave_1 added [ 175.647843][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.677060][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.689246][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 13:24:37 executing program 0: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x23c) write(r0, &(0x7f00000000c0)="1f0000000104ff01004354c007110000f30501000a000100020423dcffdf00", 0x1f) [ 175.708779][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.725499][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.743543][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.762624][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.771047][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.794796][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.815938][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.849558][ T8089] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.859009][ T8089] bridge0: port 2(bridge_slave_1) entered disabled state 13:24:37 executing program 0: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x23c) write(r0, &(0x7f00000000c0)="1f0000000104ff01004354c007110000f30501000a000100020423dcffdf00", 0x1f) [ 175.870530][ T8089] device bridge_slave_1 entered promiscuous mode [ 175.897931][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 13:24:37 executing program 0: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x23c) write(r0, &(0x7f00000000c0)="1f0000000104ff01004354c007110000f30501000a000100020423dcffdf00", 0x1f) [ 175.984477][ T8084] device hsr_slave_0 entered promiscuous mode [ 176.002381][ T8084] device hsr_slave_1 entered promiscuous mode [ 176.051999][ T8084] debugfs: Directory 'hsr0' with parent '/' already present! [ 176.081862][ T8205] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 176.149071][ T8089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 176.197040][ T8056] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.215773][ T8215] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 176.257606][ T8089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 176.367355][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 176.396669][ T8087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 176.444084][ T8238] ================================================================== [ 176.452228][ T8238] BUG: KCSAN: data-race in osq_lock / osq_lock [ 176.458379][ T8238] [ 176.460764][ T8238] write to 0xffff88812be2b054 of 4 bytes by task 8235 on cpu 0: [ 176.468423][ T8238] osq_lock+0x89/0x2f0 [ 176.472527][ T8238] rwsem_optimistic_spin+0x5f/0x320 [ 176.477742][ T8238] rwsem_down_write_slowpath+0x109/0x950 [ 176.483387][ T8238] down_write+0x88/0x90 [ 176.487566][ T8238] unlink_file_vma+0x5b/0x90 [ 176.492214][ T8238] free_pgtables+0x14f/0x200 [ 176.496838][ T8238] exit_mmap+0x151/0x300 [ 176.501089][ T8238] mmput+0xea/0x280 [ 176.504907][ T8238] flush_old_exec+0x655/0xfd0 [ 176.509597][ T8238] load_elf_binary+0x69a/0x2ec0 [ 176.514456][ T8238] search_binary_handler+0x127/0x420 [ 176.519762][ T8238] __do_execve_file.isra.0+0xb76/0x11d0 [ 176.525324][ T8238] __x64_sys_execve+0x62/0x80 [ 176.530142][ T8238] do_syscall_64+0xcc/0x370 [ 176.534659][ T8238] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 176.540544][ T8238] [ 176.542889][ T8238] read to 0xffff88812be2b054 of 4 bytes by task 8238 on cpu 1: [ 176.550438][ T8238] osq_lock+0x170/0x2f0 [ 176.555100][ T8238] rwsem_optimistic_spin+0x5f/0x320 [ 176.560396][ T8238] rwsem_down_write_slowpath+0x109/0x950 [ 176.567092][ T8238] down_write+0x88/0x90 [ 176.571280][ T8238] __vma_adjust+0x196/0x12a0 [ 176.575891][ T8238] __split_vma+0x208/0x350 [ 176.581517][ T8238] split_vma+0x73/0xa0 [ 176.585665][ T8238] mprotect_fixup+0x43f/0x510 [ 176.590358][ T8238] do_mprotect_pkey+0x3eb/0x660 [ 176.595236][ T8238] __x64_sys_mprotect+0x51/0x70 [ 176.600100][ T8238] do_syscall_64+0xcc/0x370 [ 176.604611][ T8238] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 176.610583][ T8238] [ 176.612365][ T8058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.612922][ T8238] Reported by Kernel Concurrency Sanitizer on: [ 176.625666][ T8238] CPU: 1 PID: 8238 Comm: grep Not tainted 5.4.0-rc6+ #0 [ 176.632607][ T8238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.642673][ T8238] ================================================================== [ 176.650737][ T8238] Kernel panic - not syncing: panic_on_warn set ... [ 176.657340][ T8238] CPU: 1 PID: 8238 Comm: grep Not tainted 5.4.0-rc6+ #0 [ 176.664291][ T8238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.665730][ T8058] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.674354][ T8238] Call Trace: [ 176.674393][ T8238] dump_stack+0xf5/0x159 [ 176.674417][ T8238] panic+0x210/0x640 [ 176.674443][ T8238] ? vprintk_func+0x8d/0x140 [ 176.674469][ T8238] kcsan_report.cold+0xc/0xe [ 176.674493][ T8238] kcsan_setup_watchpoint+0x3fe/0x410 [ 176.674515][ T8238] __tsan_read4+0x145/0x1f0 [ 176.674535][ T8238] osq_lock+0x170/0x2f0 [ 176.674567][ T8238] rwsem_optimistic_spin+0x5f/0x320 [ 176.721038][ T8238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.727308][ T8238] rwsem_down_write_slowpath+0x109/0x950 [ 176.732965][ T8238] ? __read_once_size.constprop.0+0x12/0x20 [ 176.738928][ T8238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.745248][ T8238] ? refcount_sub_and_test_checked+0xc8/0x190 [ 176.751340][ T8238] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 176.757260][ T8238] ? __read_once_size+0x41/0xe0 [ 176.762130][ T8238] ? uprobe_mmap+0xd9/0x8e0 [ 176.766663][ T8238] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 176.772761][ T8238] down_write+0x88/0x90 [ 176.776988][ T8238] __vma_adjust+0x196/0x12a0 [ 176.781692][ T8238] __split_vma+0x208/0x350 [ 176.786117][ T8238] split_vma+0x73/0xa0 [ 176.790197][ T8238] mprotect_fixup+0x43f/0x510 [ 176.794904][ T8238] do_mprotect_pkey+0x3eb/0x660 [ 176.799790][ T8238] __x64_sys_mprotect+0x51/0x70 [ 176.804665][ T8238] do_syscall_64+0xcc/0x370 [ 176.809200][ T8238] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 176.814916][ T8058] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 176.815196][ T8238] RIP: 0033:0x7f1a7c0e2447 [ 176.815233][ T8238] Code: 73 01 c3 48 8d 0d 5d ad 20 00 31 d2 48 29 c2 89 11 48 83 c8 ff eb eb 90 90 90 90 90 90 90 90 90 90 90 90 b8 0a 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 2d ad 20 00 31 d2 48 29 c2 89 [ 176.849741][ T8238] RSP: 002b:00007ffd83267c38 EFLAGS: 00000206 ORIG_RAX: 000000000000000a [ 176.858170][ T8238] RAX: ffffffffffffffda RBX: 00007f1a7c2ea9a8 RCX: 00007f1a7c0e2447 [ 176.866189][ T8238] RDX: 0000000000000000 RSI: 00000000001ff000 RDI: 00007f1a7bcbf000 [ 176.871944][ T8058] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 176.874187][ T8238] RBP: 00007ffd83267f90 R08: 0000000000000003 R09: 0000000000000000 [ 176.892480][ T8238] R10: 0000000000000001 R11: 0000000000000206 R12: 00007ffd83268078 [ 176.900471][ T8238] R13: 0000000000000002 R14: 0000000000000030 R15: 00007ffd83267c80 [ 176.910158][ T8238] Kernel Offset: disabled [ 176.914504][ T8238] Rebooting in 86400 seconds..