[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 39.438543][ T23] audit: type=1800 audit(1572004874.786:25): pid=7052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 39.465713][ T23] audit: type=1800 audit(1572004874.786:26): pid=7052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 39.486269][ T23] audit: type=1800 audit(1572004874.796:27): pid=7052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.224' (ECDSA) to the list of known hosts. 2019/10/25 12:01:22 fuzzer started 2019/10/25 12:01:24 dialing manager at 10.128.0.105:33971 2019/10/25 12:01:25 syscalls: 2529 2019/10/25 12:01:25 code coverage: enabled 2019/10/25 12:01:25 comparison tracing: enabled 2019/10/25 12:01:25 extra coverage: extra coverage is not supported by the kernel 2019/10/25 12:01:25 setuid sandbox: enabled 2019/10/25 12:01:25 namespace sandbox: enabled 2019/10/25 12:01:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/25 12:01:25 fault injection: enabled 2019/10/25 12:01:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/25 12:01:25 net packet injection: enabled 2019/10/25 12:01:25 net device setup: enabled 2019/10/25 12:01:25 concurrency sanitizer: enabled syzkaller login: [ 51.874664][ T7217] KCSAN: could not find function: 'poll_schedule_timeout' 2019/10/25 12:01:33 adding functions to KCSAN blacklist: 'ep_poll' 'tcp_poll' 'generic_fillattr' 'task_dump_owner' 'poll_schedule_timeout' 'ktime_get_seconds' '__hrtimer_run_queues' '__ext4_new_inode' 'blk_mq_get_request' 'tomoyo_supervisor' 'pipe_poll' 'atime_needs_update' 'ktime_get_real_seconds' 'run_timer_softirq' 'ext4_free_inodes_count' 'tcp_add_backlog' 'tick_do_update_jiffies64' 'find_get_pages_range_tag' 'generic_permission' 'generic_write_end' 'pid_update_inode' 'taskstats_exit' 'tick_sched_do_timer' '__tcp_select_window' 'rcu_gp_fqs_check_wake' 'update_defense_level' 'tick_nohz_idle_stop_tick' 'rcu_gp_fqs_loop' 'find_next_bit' 'mod_timer' '__alloc_file' 'do_nanosleep' 'dd_has_work' '__dev_queue_xmit' 'echo_char' '__nf_ct_refresh_acct' 'blk_mq_dispatch_rq_list' 'ext4_setattr' 12:02:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f0000000000)) timer_delete(0x0) [ 86.683432][ T7221] IPVS: ftp: loaded support on port[0] = 21 12:02:02 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x35a, 0x69, 0x0, {0x0, 0x0, 0x3}}, 0xfffffff4) setxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0x8, 0x1}, {0x9, 0x1000}]}, 0x14, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x960000, r0, &(0x7f0000000800)="371d848c24591792863b2d5d6bc3c76a000001000000000079e6ae1a07de1d42fd46fdfada485aaea1cda588838353786b2ff4f7b644e0839054fcd3486dfe9795b35eae35042b0ae441065b6570a16e9f59424cf705c5958d33fbfcec4080876e65ccb6cc4a9a8e6a0f46559eb725fdab41865ab93895a77a3e494f920e9617dc006dcbe35e9ff7112f2a58bbd9f7123b6661186821900b092f90a53e27d726e56671cc23bf1472b65c3131051de54ab9b1fe6b7b515163790da97ebdaf688dc5b30aed84cbb5c86c3c0a64548106e6a4bfd61442897160333d8ad0b914906fb8839422a3", 0x2c84e1972a71ed36}]) [ 86.777215][ T7221] chnl_net:caif_netlink_parms(): no params data found [ 86.851339][ T7221] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.872230][ T7221] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.891820][ T7221] device bridge_slave_0 entered promiscuous mode [ 86.899453][ T7221] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.922526][ T7221] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.931833][ T7221] device bridge_slave_1 entered promiscuous mode [ 86.955559][ T7224] IPVS: ftp: loaded support on port[0] = 21 [ 86.971452][ T7221] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.001553][ T7221] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.042419][ T7221] team0: Port device team_slave_0 added [ 87.049506][ T7221] team0: Port device team_slave_1 added 12:02:02 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0xe0923027822ef55f, 0x11, r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x10000026f) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 87.145694][ T7221] device hsr_slave_0 entered promiscuous mode [ 87.201996][ T7221] device hsr_slave_1 entered promiscuous mode [ 87.323849][ T7224] chnl_net:caif_netlink_parms(): no params data found [ 87.368650][ T7221] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.375765][ T7221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.383181][ T7221] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.390230][ T7221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.518498][ T7227] IPVS: ftp: loaded support on port[0] = 21 [ 87.644803][ T7224] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.672007][ T7224] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.680078][ T7224] device bridge_slave_0 entered promiscuous mode [ 87.723783][ T7221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.745012][ T7224] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.771779][ T7224] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.781900][ T7224] device bridge_slave_1 entered promiscuous mode [ 87.820821][ T7221] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.867337][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.879011][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.923467][ T17] bridge0: port 2(bridge_slave_1) entered disabled state 12:02:03 executing program 3: unshare(0x40600) r0 = syz_open_dev$loop(&(0x7f0000c17ff5)='/dev/loop#\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x5) [ 87.963963][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 88.051963][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.082153][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.113549][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.120626][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.152426][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.192291][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.223514][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.230770][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.272424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.313080][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.415333][ T7224] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.444199][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.464368][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.493171][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.532157][ T7224] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.550395][ T7255] IPVS: ftp: loaded support on port[0] = 21 [ 88.556910][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.572972][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.657417][ T7227] chnl_net:caif_netlink_parms(): no params data found [ 88.676680][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 88.692400][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.700950][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 88.762609][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.785354][ T7221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 88.857499][ T7224] team0: Port device team_slave_0 added [ 88.907353][ T7224] team0: Port device team_slave_1 added [ 88.926529][ T7227] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.934875][ T7227] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.953448][ T7227] device bridge_slave_0 entered promiscuous mode [ 88.971281][ T7221] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.995220][ T7227] bridge0: port 2(bridge_slave_1) entered blocking state 12:02:04 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',noextend,\x00']) write$P9_RREADDIR(r0, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r0, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r1 = getpgrp(0xffffffffffffffff) prlimit64(r1, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/mcfilter\x00') write$P9_RAUTH(r2, &(0x7f00000002c0)={0x14, 0x67, 0x1, {0x102, 0x0, 0x6}}, 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/rtc0\x00', 0xfffffffffffffffd, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/4096, &(0x7f0000000080)=0xffffffffffffffd4) r3 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r4, 0x800448d3, &(0x7f0000001440)={{0x88, 0x7, 0x5, 0x5a, 0x58, 0xdd}, 0x1, 0x9, 0x4, 0x6, 0x9, "e214b709e983a8550bcb252bec86052ee7ba080c558334962b702ae823c2a9603c84c84d6974e4e7ffcbe25a8f23d987db71651366e82486a6d372bae50ce85c9cb6a530fdef13580a5c6b1fbd47c2457f8f334e4443f3697f2e6eaf6f91487a5a94ba02a50b26cc7ff2195e452af21c99416f4a2855cb8ef4b68d24f04ecea8"}) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000100)) ptrace(0x10, r5) [ 89.002922][ T7227] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.010881][ T7227] device bridge_slave_1 entered promiscuous mode [ 89.124879][ T7224] device hsr_slave_0 entered promiscuous mode [ 89.162053][ T7224] device hsr_slave_1 entered promiscuous mode [ 89.201704][ T7224] debugfs: Directory 'hsr0' with parent '/' already present! [ 89.342199][ T7227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.494767][ T7227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.539305][ T7255] chnl_net:caif_netlink_parms(): no params data found [ 89.719845][ T7227] team0: Port device team_slave_0 added [ 89.751441][ T7227] team0: Port device team_slave_1 added [ 89.904986][ T7255] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.954686][ T7255] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.995533][ T7255] device bridge_slave_0 entered promiscuous mode [ 90.038893][ T7224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.118297][ T7227] device hsr_slave_0 entered promiscuous mode [ 90.195188][ T7227] device hsr_slave_1 entered promiscuous mode [ 90.254972][ T7227] debugfs: Directory 'hsr0' with parent '/' already present! [ 90.281278][ T7255] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.298681][ T7255] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.340039][ T7255] device bridge_slave_1 entered promiscuous mode [ 90.376421][ T7224] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.408974][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.420870][ T7296] IPVS: ftp: loaded support on port[0] = 21 [ 90.432597][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.528233][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.595741][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.652286][ T7256] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.659418][ T7256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.729672][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.790995][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.851469][ T7256] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.858616][ T7256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.927721][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 12:02:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f0000000000)) timer_delete(0x0) 12:02:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(0x0, 0x0) [ 90.973164][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.043475][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.123040][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.175746][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.222880][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.283161][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.342441][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.403534][ T7255] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 91.484306][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.524570][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.567605][ T7224] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 12:02:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f0000000000)) timer_delete(0x0) [ 91.627234][ T7255] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.686412][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.701412][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.779835][ T7224] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.935127][ T7255] team0: Port device team_slave_0 added [ 91.947316][ T7322] IPVS: ftp: loaded support on port[0] = 21 [ 91.982285][ T7255] team0: Port device team_slave_1 added 12:02:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f0000000000)) timer_delete(0x0) [ 92.135200][ T7227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.282893][ T7227] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.402130][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.410052][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.534674][ T7255] device hsr_slave_0 entered promiscuous mode [ 92.582127][ T7255] device hsr_slave_1 entered promiscuous mode [ 92.611860][ T7255] debugfs: Directory 'hsr0' with parent '/' already present! [ 92.688767][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.722780][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.775077][ T7297] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.782194][ T7297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.861539][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.922554][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.965184][ T7297] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.972324][ T7297] bridge0: port 2(bridge_slave_1) entered forwarding state 12:02:08 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x802, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000001c0), 0xa) [ 93.034066][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 93.062172][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.180007][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 93.203377][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 93.262329][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 93.271772][ T7296] chnl_net:caif_netlink_parms(): no params data found [ 93.289847][ T7227] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 12:02:08 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x802, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000001c0), 0xa) [ 93.312639][ T23] kauditd_printk_skb: 3 callbacks suppressed [ 93.312666][ T23] audit: type=1804 audit(1572004928.666:31): pid=7349 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir489847161/syzkaller.xa4KP0/0/bus" dev="sda1" ino=16527 res=1 [ 93.378251][ T7227] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 93.467937][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 93.493137][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 93.510179][ T23] audit: type=1804 audit(1572004928.716:32): pid=7348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir489847161/syzkaller.xa4KP0/0/bus" dev="sda1" ino=16527 res=1 [ 93.552562][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 93.561456][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.602073][ C1] hrtimer: interrupt took 31367 ns [ 93.649035][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.705903][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.766391][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.932343][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 94.051254][ T7322] chnl_net:caif_netlink_parms(): no params data found [ 94.142003][ T7227] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 94.190959][ T7296] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.231067][ T7296] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.270548][ T7296] device bridge_slave_0 entered promiscuous mode [ 94.319403][ T7255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.360775][ T7296] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.385496][ T7296] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.421781][ T7296] device bridge_slave_1 entered promiscuous mode [ 94.471074][ T7255] 8021q: adding VLAN 0 to HW filter on device team0 [ 94.499624][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.520227][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:02:09 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x802, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000001c0), 0xa) [ 94.587525][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.610345][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.658288][ T7256] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.665431][ T7256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.721212][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.756837][ T23] audit: type=1804 audit(1572004930.106:33): pid=7371 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir489847161/syzkaller.xa4KP0/0/bus" dev="sda1" ino=16527 res=1 [ 94.793613][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 12:02:10 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x802, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000001c0), 0xa) [ 94.827879][ T7256] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.835044][ T7256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.866095][ T23] audit: type=1804 audit(1572004930.136:34): pid=7374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir489847161/syzkaller.xa4KP0/0/bus" dev="sda1" ino=16527 res=1 [ 94.888608][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 94.961997][ T23] audit: type=1804 audit(1572004930.136:35): pid=7375 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir489847161/syzkaller.xa4KP0/0/bus" dev="sda1" ino=16527 res=1 [ 95.029614][ T7296] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 12:02:10 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x35a, 0x69, 0x0, {0x0, 0x0, 0x3}}, 0xfffffff4) setxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0x8, 0x1}, {0x9, 0x1000}]}, 0x14, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x960000, r0, &(0x7f0000000800)="371d848c24591792863b2d5d6bc3c76a000001000000000079e6ae1a07de1d42fd46fdfada485aaea1cda588838353786b2ff4f7b644e0839054fcd3486dfe9795b35eae35042b0ae441065b6570a16e9f59424cf705c5958d33fbfcec4080876e65ccb6cc4a9a8e6a0f46559eb725fdab41865ab93895a77a3e494f920e9617dc006dcbe35e9ff7112f2a58bbd9f7123b6661186821900b092f90a53e27d726e56671cc23bf1472b65c3131051de54ab9b1fe6b7b515163790da97ebdaf688dc5b30aed84cbb5c86c3c0a64548106e6a4bfd61442897160333d8ad0b914906fb8839422a3", 0x2c84e1972a71ed36}]) [ 95.087441][ T7322] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.102856][ T7322] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.111062][ T7322] device bridge_slave_0 entered promiscuous mode [ 95.200222][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.219187][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.283513][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.328681][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.369826][ T23] audit: type=1804 audit(1572004930.716:36): pid=7406 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir489847161/syzkaller.xa4KP0/1/bus" dev="sda1" ino=16534 res=1 [ 95.378103][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.500556][ T23] audit: type=1804 audit(1572004930.846:37): pid=7405 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir489847161/syzkaller.xa4KP0/1/bus" dev="sda1" ino=16534 res=1 [ 95.577923][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.620386][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.666573][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.725320][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.770099][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.821361][ T7255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.847690][ T7296] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 95.879948][ T7322] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.895540][ T7322] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.938016][ T7322] device bridge_slave_1 entered promiscuous mode [ 95.981760][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.011883][ T7405] syz-executor.1 (7405) used greatest stack depth: 9680 bytes left 12:02:11 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0xe0923027822ef55f, 0x11, r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x10000026f) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 96.100703][ T7296] team0: Port device team_slave_0 added [ 96.136576][ T7296] team0: Port device team_slave_1 added [ 96.164293][ T7322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 96.218308][ T7322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 96.287168][ T7255] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.424730][ T7296] device hsr_slave_0 entered promiscuous mode [ 96.472167][ T7296] device hsr_slave_1 entered promiscuous mode [ 96.493600][ T7296] debugfs: Directory 'hsr0' with parent '/' already present! [ 96.512048][ T7322] team0: Port device team_slave_0 added [ 96.524259][ T7322] team0: Port device team_slave_1 added [ 96.714981][ T7322] device hsr_slave_0 entered promiscuous mode [ 96.753800][ T7322] device hsr_slave_1 entered promiscuous mode [ 96.805268][ T7322] debugfs: Directory 'hsr0' with parent '/' already present! [ 96.863876][ T7322] ================================================================== [ 96.872022][ T7322] BUG: KCSAN: data-race in datagram_poll / skb_queue_tail [ 96.879124][ T7322] [ 96.881450][ T7322] read to 0xffff88812662a0d0 of 8 bytes by task 3890 on cpu 1: [ 96.888992][ T7322] datagram_poll+0x16e/0x300 [ 96.893583][ T7322] sock_poll+0xed/0x250 [ 96.897743][ T7322] ep_item_poll.isra.0+0x90/0x190 [ 96.902764][ T7322] ep_send_events_proc+0x113/0x590 [ 96.907874][ T7322] ep_scan_ready_list.constprop.0+0x189/0x500 [ 96.913933][ T7322] ep_poll+0xe3/0x900 [ 96.917916][ T7322] do_epoll_wait+0x162/0x180 [ 96.922501][ T7322] __x64_sys_epoll_wait+0x5e/0x80 [ 96.927535][ T7322] do_syscall_64+0xcc/0x370 [ 96.932035][ T7322] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 96.937911][ T7322] [ 96.940241][ T7322] write to 0xffff88812662a0d0 of 8 bytes by task 7322 on cpu 0: [ 96.947868][ T7322] skb_queue_tail+0x6b/0xc0 [ 96.952369][ T7322] __netlink_sendskb+0x50/0x80 [ 96.957128][ T7322] netlink_broadcast_filtered+0x6c3/0x800 [ 96.962843][ T7322] netlink_broadcast+0x43/0x60 [ 96.967604][ T7322] kobject_uevent_env+0xb8f/0xc00 [ 96.972623][ T7322] kobject_uevent+0x29/0x40 [ 96.977131][ T7322] net_rx_queue_update_kobjects+0xf9/0x310 [ 96.982948][ T7322] netdev_register_kobject+0x198/0x240 [ 96.988410][ T7322] register_netdevice+0x66e/0xa50 [ 96.993434][ T7322] nsim_create+0x144/0x190 [ 96.997854][ T7322] __nsim_dev_port_add+0x200/0x330 [ 97.002958][ T7322] nsim_dev_probe+0x499/0xc20 [ 97.007630][ T7322] nsim_bus_probe+0x1f/0x30 [ 97.012117][ T7322] [ 97.014433][ T7322] Reported by Kernel Concurrency Sanitizer on: [ 97.020581][ T7322] CPU: 0 PID: 7322 Comm: syz-executor.5 Not tainted 5.4.0-rc3+ #0 [ 97.028376][ T7322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.038421][ T7322] ================================================================== [ 97.046471][ T7322] Kernel panic - not syncing: panic_on_warn set ... [ 97.053059][ T7322] CPU: 0 PID: 7322 Comm: syz-executor.5 Not tainted 5.4.0-rc3+ #0 [ 97.060850][ T7322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.070895][ T7322] Call Trace: [ 97.074182][ T7322] dump_stack+0xf5/0x159 [ 97.078425][ T7322] panic+0x210/0x640 [ 97.082321][ T7322] ? register_netdevice+0x66e/0xa50 [ 97.087509][ T7322] ? vprintk_func+0x8d/0x140 [ 97.092107][ T7322] kcsan_report.cold+0xc/0x10 [ 97.096800][ T7322] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 97.102362][ T7322] __tsan_write8+0x32/0x40 [ 97.106774][ T7322] skb_queue_tail+0x6b/0xc0 [ 97.111283][ T7322] __netlink_sendskb+0x50/0x80 [ 97.116049][ T7322] netlink_broadcast_filtered+0x6c3/0x800 [ 97.121778][ T7322] netlink_broadcast+0x43/0x60 [ 97.126541][ T7322] kobject_uevent_env+0xb8f/0xc00 [ 97.131566][ T7322] kobject_uevent+0x29/0x40 [ 97.136072][ T7322] net_rx_queue_update_kobjects+0xf9/0x310 [ 97.141885][ T7322] netdev_register_kobject+0x198/0x240 [ 97.147364][ T7322] register_netdevice+0x66e/0xa50 [ 97.152391][ T7322] nsim_create+0x144/0x190 [ 97.156804][ T7322] __nsim_dev_port_add+0x200/0x330 [ 97.161911][ T7322] ? __bpf_offload_dev_match.isra.0+0x600/0x640 [ 97.168148][ T7322] nsim_dev_probe+0x499/0xc20 [ 97.172829][ T7322] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 97.178455][ T7322] ? arch_local_irq_disable+0x32/0x42 [ 97.183819][ T7322] ? nsim_bus_remove+0x30/0x30 [ 97.188576][ T7322] nsim_bus_probe+0x1f/0x30 [ 97.193076][ T7322] really_probe+0x215/0x4b0 [ 97.197574][ T7322] driver_probe_device+0xbe/0x170 [ 97.202593][ T7322] __device_attach_driver+0x13a/0x160 [ 97.207963][ T7322] ? driver_allows_async_probing+0xe0/0xe0 [ 97.213762][ T7322] bus_for_each_drv+0xeb/0x140 [ 97.218533][ T7322] __device_attach+0x18f/0x260 [ 97.223296][ T7322] device_initial_probe+0x24/0x30 [ 97.228313][ T7322] bus_probe_device+0x14c/0x170 [ 97.233159][ T7322] device_add+0x758/0xcd0 [ 97.237482][ T7322] ? __tsan_write4+0x32/0x40 [ 97.242067][ T7322] device_register+0x27/0x40 [ 97.246653][ T7322] new_device_store+0x176/0x2f0 [ 97.251500][ T7322] ? __write_once_size.constprop.0+0x20/0x20 [ 97.257477][ T7322] bus_attr_store+0x5e/0x80 [ 97.261978][ T7322] ? bus_attr_show+0x70/0x70 [ 97.266558][ T7322] sysfs_kf_write+0xb2/0xe0 [ 97.271052][ T7322] kernfs_fop_write+0x1f4/0x2e0 [ 97.275902][ T7322] ? sysfs_kf_bin_read+0x170/0x170 [ 97.281009][ T7322] __vfs_write+0x67/0xc0 [ 97.285251][ T7322] ? kernfs_seq_show+0xe0/0xe0 [ 97.290017][ T7322] vfs_write+0x18a/0x390 [ 97.294254][ T7322] ksys_write+0xd5/0x1b0 [ 97.298494][ T7322] __x64_sys_write+0x4c/0x60 [ 97.303089][ T7322] do_syscall_64+0xcc/0x370 [ 97.307601][ T7322] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 97.313488][ T7322] RIP: 0033:0x4139f0 [ 97.317384][ T7322] Code: b0 89 c8 f7 d8 eb ed b8 6e 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 3d 1d 46 66 00 00 75 14 b8 01 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff [ 97.336981][ T7322] RSP: 002b:00007ffc58bb6198 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 97.345384][ T7322] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004139f0 [ 97.353343][ T7322] RDX: 0000000000000003 RSI: 00007ffc58bb61c0 RDI: 0000000000000004 [ 97.361308][ T7322] RBP: 00007ffc58bb61c0 R08: 0000000000000000 R09: 0000000000000003 [ 97.369269][ T7322] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000004bf4f4 [ 97.377229][ T7322] R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000006 [ 97.386440][ T7322] Kernel Offset: disabled [ 97.390774][ T7322] Rebooting in 86400 seconds..