[ 41.754205][ T26] audit: type=1800 audit(1574153038.435:22): pid=7407 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[ 42.162199][ T7430] rsyslogd (7430) used greatest stack depth: 10512 bytes left [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 42.621906][ T7473] sshd (7473) used greatest stack depth: 10128 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.167' (ECDSA) to the list of known hosts. 2019/11/19 08:44:06 fuzzer started 2019/11/19 08:44:07 dialing manager at 10.128.0.105:42849 2019/11/19 08:44:07 checking machine... 2019/11/19 08:44:07 checking revisions... 2019/11/19 08:44:07 testing simple program... syzkaller login: [ 51.287765][ T7575] IPVS: ftp: loaded support on port[0] = 21 2019/11/19 08:44:08 building call list... executing program [ 54.343404][ T7571] can: request_module (can-proto-0) failed. [ 54.355668][ T7571] can: request_module (can-proto-0) failed. [ 54.367071][ T7571] can: request_module (can-proto-0) failed. 2019/11/19 08:44:16 syscalls: 2566 2019/11/19 08:44:16 code coverage: enabled 2019/11/19 08:44:16 comparison tracing: enabled 2019/11/19 08:44:16 extra coverage: extra coverage is not supported by the kernel 2019/11/19 08:44:16 setuid sandbox: enabled 2019/11/19 08:44:16 namespace sandbox: enabled 2019/11/19 08:44:16 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/19 08:44:16 fault injection: enabled 2019/11/19 08:44:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/19 08:44:16 net packet injection: enabled 2019/11/19 08:44:16 net device setup: enabled 2019/11/19 08:44:16 concurrency sanitizer: enabled 2019/11/19 08:44:16 devlink PCI setup: PCI device 0000:00:10.0 is not available 08:44:16 executing program 0: io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/74) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) 08:44:17 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x1, 0x0) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r2) write$9p(r0, &(0x7f0000000000)="0600000000000000c9b9000f050000002a1ff7adf576f3790f68bc2c197cbf8d63735a09ab8383afd2de1a5587fe067fde18fa64249e1dabdd9514480a16f3733d18f833b3aacfcf04f7b0bdd78687423a6bff51b9f9218a249e3d00"/104, 0xb3) [ 60.446946][ T7619] IPVS: ftp: loaded support on port[0] = 21 [ 60.540412][ T7619] chnl_net:caif_netlink_parms(): no params data found [ 60.596142][ T7622] IPVS: ftp: loaded support on port[0] = 21 [ 60.609557][ T7619] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.618601][ T7619] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.626425][ T7619] device bridge_slave_0 entered promiscuous mode [ 60.645450][ T7619] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.652538][ T7619] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.660473][ T7619] device bridge_slave_1 entered promiscuous mode [ 60.680931][ T7619] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.691895][ T7619] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:44:17 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9067f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8}]}]}, 0x44}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) [ 60.721889][ T7619] team0: Port device team_slave_0 added [ 60.738586][ T7619] team0: Port device team_slave_1 added [ 60.836854][ T7619] device hsr_slave_0 entered promiscuous mode [ 60.874540][ T7619] device hsr_slave_1 entered promiscuous mode [ 60.916883][ T7622] chnl_net:caif_netlink_parms(): no params data found [ 60.932405][ T7625] IPVS: ftp: loaded support on port[0] = 21 [ 60.987008][ T7619] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.994103][ T7619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.001526][ T7619] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.008697][ T7619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.076517][ T7622] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.083598][ T7622] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.126115][ T7622] device bridge_slave_0 entered promiscuous mode [ 61.146615][ T7622] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.184274][ T7622] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.215656][ T7622] device bridge_slave_1 entered promiscuous mode 08:44:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) getcwd(0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='htcp\x00', 0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7e45c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev}, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x8001, 0x1}, 0xc) [ 61.335451][ T7622] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.417806][ T7622] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.522015][ T7622] team0: Port device team_slave_0 added [ 61.541500][ T7619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.584588][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.615596][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.676711][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 61.734399][ T7622] team0: Port device team_slave_1 added [ 61.799824][ T7619] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.802486][ T7652] IPVS: ftp: loaded support on port[0] = 21 [ 61.846444][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.885179][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.987244][ T7622] device hsr_slave_0 entered promiscuous mode [ 62.074657][ T7622] device hsr_slave_1 entered promiscuous mode [ 62.104262][ T7622] debugfs: Directory 'hsr0' with parent '/' already present! [ 62.155559][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.184881][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 08:44:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000200)='./bus\x00', 0x5aa9e39db596d48b) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000122000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000023000/0x3000)=nil, &(0x7f000009f000/0x1000)=nil, &(0x7f000046d000/0x600000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00004c9000/0x8000)=nil, &(0x7f000062b000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000cf000/0x1000)=nil, &(0x7f0000650000/0x1000)=nil, 0x0, 0x0, r2}, 0x68) [ 62.224682][ T2885] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.233157][ T2885] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.271839][ T7625] chnl_net:caif_netlink_parms(): no params data found [ 62.387382][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.419581][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.496015][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.503374][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.627855][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.678870][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.776923][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.830469][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.885196][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.925068][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.956861][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.996715][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.025292][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.056337][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.116028][ T7619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.169455][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.222107][ T7681] IPVS: ftp: loaded support on port[0] = 21 [ 63.239223][ T7625] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.264377][ T7625] bridge0: port 1(bridge_slave_0) entered disabled state 08:44:20 executing program 5: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x1000, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) [ 63.284413][ T7625] device bridge_slave_0 entered promiscuous mode [ 63.332438][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.354482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.377962][ T7619] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.406946][ T7625] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.424512][ T7625] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.451872][ T7625] device bridge_slave_1 entered promiscuous mode [ 63.494856][ T7652] chnl_net:caif_netlink_parms(): no params data found [ 63.575228][ T7625] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.646475][ T7625] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.764965][ T7625] team0: Port device team_slave_0 added [ 63.773519][ T7622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.865157][ T7625] team0: Port device team_slave_1 added [ 63.874404][ T7691] IPVS: ftp: loaded support on port[0] = 21 [ 63.986739][ T7625] device hsr_slave_0 entered promiscuous mode [ 64.054549][ T7625] device hsr_slave_1 entered promiscuous mode [ 64.094268][ T7625] debugfs: Directory 'hsr0' with parent '/' already present! [ 64.105264][ T7652] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.141533][ T7652] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.167094][ T7652] device bridge_slave_0 entered promiscuous mode [ 64.186574][ T7681] chnl_net:caif_netlink_parms(): no params data found [ 64.204103][ C1] hrtimer: interrupt took 35824 ns [ 64.250357][ T7652] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.260928][ T7652] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.269517][ T7652] device bridge_slave_1 entered promiscuous mode [ 64.290205][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 08:44:21 executing program 0: io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/74) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) [ 64.309105][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.342280][ T7652] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.356646][ T7622] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.387097][ T7652] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.435463][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.460893][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.487968][ T7643] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.495197][ T7643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.536676][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.576803][ T7643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.593556][ T7722] ================================================================== [ 64.596284][ T7643] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.601694][ T7722] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 64.608724][ T7643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.616196][ T7722] [ 64.616214][ T7722] read to 0xffff88812526f048 of 2 bytes by task 7724 on cpu 1: [ 64.616262][ T7722] pid_update_inode+0x25/0x70 [ 64.637931][ T7722] pid_revalidate+0x91/0xd0 08:44:21 executing program 0: io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/74) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) [ 64.642434][ T7722] lookup_fast+0x6f2/0x700 [ 64.646868][ T7722] walk_component+0x6d/0xe70 [ 64.651473][ T7722] path_lookupat.isra.0+0x13a/0x5a0 [ 64.656674][ T7722] filename_lookup+0x145/0x2b0 [ 64.661440][ T7722] user_path_at_empty+0x4c/0x70 [ 64.666299][ T7722] vfs_statx+0xd9/0x190 [ 64.670459][ T7722] __do_sys_newstat+0x51/0xb0 [ 64.675131][ T7722] __x64_sys_newstat+0x3a/0x50 [ 64.679899][ T7722] do_syscall_64+0xcc/0x370 [ 64.684506][ T7722] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 64.690391][ T7722] [ 64.692747][ T7722] write to 0xffff88812526f048 of 2 bytes by task 7722 on cpu 0: [ 64.700380][ T7722] pid_update_inode+0x51/0x70 [ 64.705060][ T7722] pid_revalidate+0x91/0xd0 [ 64.709570][ T7722] lookup_fast+0x6f2/0x700 [ 64.713998][ T7722] walk_component+0x6d/0xe70 [ 64.718609][ T7722] link_path_walk.part.0+0x5d3/0xa90 [ 64.723900][ T7722] path_openat+0x14f/0x36e0 [ 64.729202][ T7722] do_filp_open+0x11e/0x1b0 [ 64.733709][ T7722] do_sys_open+0x3b3/0x4f0 [ 64.738129][ T7722] __x64_sys_open+0x55/0x70 [ 64.743331][ T7722] do_syscall_64+0xcc/0x370 [ 64.747858][ T7722] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 64.753738][ T7722] [ 64.756059][ T7722] Reported by Kernel Concurrency Sanitizer on: [ 64.762241][ T7722] CPU: 0 PID: 7722 Comm: ps Not tainted 5.4.0-rc7+ #0 [ 64.762425][ T7622] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 64.768984][ T7722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.768991][ T7722] ================================================================== [ 64.769001][ T7722] Kernel panic - not syncing: panic_on_warn set ... [ 64.769015][ T7722] CPU: 0 PID: 7722 Comm: ps Not tainted 5.4.0-rc7+ #0 [ 64.769023][ T7722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.769028][ T7722] Call Trace: [ 64.769058][ T7722] dump_stack+0x11d/0x181 [ 64.828401][ T7722] panic+0x210/0x640 [ 64.832322][ T7722] ? vprintk_func+0x8d/0x140 [ 64.836928][ T7722] kcsan_report.cold+0xc/0xd 08:44:21 executing program 0: io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/74) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) [ 64.841527][ T7722] kcsan_setup_watchpoint+0x3fe/0x460 [ 64.846915][ T7722] __tsan_unaligned_write2+0xc4/0x100 [ 64.847555][ T7622] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.852372][ T7722] pid_update_inode+0x51/0x70 [ 64.852396][ T7722] pid_revalidate+0x91/0xd0 [ 64.871944][ T7722] lookup_fast+0x6f2/0x700 [ 64.876377][ T7722] walk_component+0x6d/0xe70 [ 64.880972][ T7722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 64.887221][ T7722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 64.893474][ T7722] ? security_inode_permission+0xa5/0xc0 [ 64.899210][ T7722] ? inode_permission+0xa0/0x3c0 [ 64.904204][ T7722] link_path_walk.part.0+0x5d3/0xa90 [ 64.909514][ T7722] path_openat+0x14f/0x36e0 [ 64.914035][ T7722] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 64.920079][ T7722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 64.926332][ T7722] ? __rcu_read_unlock+0x66/0x3c0 [ 64.932596][ T7722] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 64.938498][ T7722] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 64.944390][ T7722] ? __read_once_size+0x41/0xe0 [ 64.949257][ T7722] do_filp_open+0x11e/0x1b0 [ 64.953790][ T7722] ? __alloc_fd+0x2ef/0x3b0 [ 64.958327][ T7722] do_sys_open+0x3b3/0x4f0 [ 64.962659][ T7622] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.962766][ T7722] __x64_sys_open+0x55/0x70 [ 64.974081][ T7722] do_syscall_64+0xcc/0x370 [ 64.978640][ T7722] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 64.984529][ T7722] RIP: 0033:0x7fa0fb2a8120 [ 64.988947][ T7722] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 65.008552][ T7722] RSP: 002b:00007ffc118ca838 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 65.017167][ T7722] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fa0fb2a8120 [ 65.025352][ T7722] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fa0fb776d00 [ 65.033331][ T7722] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007fa0fb570a10 [ 65.041303][ T7722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0fb775d00 [ 65.049275][ T7722] R13: 00000000008801c0 R14: 0000000000000005 R15: 0000000000000000 [ 65.060001][ T7722] Kernel Offset: disabled [ 65.064335][ T7722] Rebooting in 86400 seconds..