[ 49.240099][ T26] audit: type=1800 audit(1572879244.006:27): pid=7741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 49.280795][ T26] audit: type=1800 audit(1572879244.016:28): pid=7741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 49.672065][ T26] audit: type=1800 audit(1572879244.536:29): pid=7741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 49.692268][ T26] audit: type=1800 audit(1572879244.536:30): pid=7741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.40' (ECDSA) to the list of known hosts. 2019/11/04 14:54:12 fuzzer started 2019/11/04 14:54:13 dialing manager at 10.128.0.105:42499 2019/11/04 14:54:13 checking machine... 2019/11/04 14:54:13 checking revisions... 2019/11/04 14:54:13 testing simple program... syzkaller login: [ 59.021361][ T7912] IPVS: ftp: loaded support on port[0] = 21 2019/11/04 14:54:14 building call list... executing program [ 62.220628][ T7908] can: request_module (can-proto-0) failed. [ 62.232196][ T7908] can: request_module (can-proto-0) failed. [ 62.243653][ T7908] can: request_module (can-proto-7) failed. [ 62.255479][ T7908] can: request_module (can-proto-0) failed. 2019/11/04 14:54:19 syscalls: 2553 2019/11/04 14:54:19 code coverage: enabled 2019/11/04 14:54:19 comparison tracing: enabled 2019/11/04 14:54:19 extra coverage: extra coverage is not supported by the kernel 2019/11/04 14:54:19 setuid sandbox: enabled 2019/11/04 14:54:19 namespace sandbox: enabled 2019/11/04 14:54:19 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 14:54:19 fault injection: enabled 2019/11/04 14:54:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 14:54:19 net packet injection: enabled 2019/11/04 14:54:19 net device setup: enabled 2019/11/04 14:54:19 concurrency sanitizer: enabled 2019/11/04 14:54:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 14:54:20 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/29, 0x1d}], 0x1) 14:54:20 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000680)={r2, r3, r2}, &(0x7f0000000600)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f00000006c0)={'rmd160\x00'}}) [ 65.704882][ T7957] IPVS: ftp: loaded support on port[0] = 21 [ 65.842865][ T7957] chnl_net:caif_netlink_parms(): no params data found [ 65.874268][ T7957] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.881421][ T7957] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.890075][ T7957] device bridge_slave_0 entered promiscuous mode [ 65.899166][ T7957] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.906349][ T7957] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.914159][ T7957] device bridge_slave_1 entered promiscuous mode [ 65.933501][ T7957] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.944210][ T7957] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.968428][ T7960] IPVS: ftp: loaded support on port[0] = 21 [ 65.975658][ T7957] team0: Port device team_slave_0 added 14:54:20 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x2001, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510d, &(0x7f0000000000)={{}, {0x3}}) r1 = semget(0x0, 0x0, 0x250) semctl$SEM_STAT(r1, 0x1, 0x12, &(0x7f00000000c0)=""/60) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400000, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) r6 = socket$xdp(0x2c, 0x3, 0x0) dup3(r6, r5, 0x0) r7 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x561032acc0386146, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r8, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r9, &(0x7f0000000340)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000700)={r9, @in={{0x2, 0x4e22, @remote}}, 0x1000, 0xcc9f}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x9f15}, &(0x7f0000000300)=0x8) r11 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r12, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r11, 0x84, 0x1f, &(0x7f0000000700)={r13, @in={{0x2, 0x4e22, @remote}}, 0x1000, 0xcc9f}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f00000003c0)={r10, 0x7fffffff, 0x8, 0xbd, 0x3f, 0x2, 0x3f, 0x1, {r13, @in6={{0xa, 0x4e22, 0x5, @empty, 0x6}}, 0x80000000, 0x0, 0x9, 0xd11}}, &(0x7f0000000480)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r13, @in6={{0xa, 0x4e24, 0xd55, @dev={0xfe, 0x80, [], 0x14}, 0x7fffffff}}, 0x5, 0xd7}, 0x90) getsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000b67000), &(0x7f00000000c0)=0x3d1) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000100)={0x4, 0x1, 0x6, 0x5, 0x20}, 0xc) [ 65.993985][ T7957] team0: Port device team_slave_1 added [ 66.064342][ T7957] device hsr_slave_0 entered promiscuous mode [ 66.111881][ T7957] device hsr_slave_1 entered promiscuous mode [ 66.181418][ T7962] IPVS: ftp: loaded support on port[0] = 21 [ 66.241879][ T7957] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.249048][ T7957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.256429][ T7957] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.263505][ T7957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.493088][ T7960] chnl_net:caif_netlink_parms(): no params data found 14:54:21 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x4, &(0x7f0000000000)='\x00\x00\x00\x00', 0x4) [ 66.624313][ T7960] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.631494][ T7960] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.657532][ T7960] device bridge_slave_0 entered promiscuous mode [ 66.704663][ T7957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.752025][ T7960] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.759100][ T7960] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.793381][ T7960] device bridge_slave_1 entered promiscuous mode [ 66.845556][ T7962] chnl_net:caif_netlink_parms(): no params data found [ 66.874054][ T2850] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.902084][ T2850] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.933247][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 67.020313][ T7957] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.058610][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.068535][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.105430][ T7960] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.123352][ T7962] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.130405][ T7962] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.163658][ T7962] device bridge_slave_0 entered promiscuous mode [ 67.193045][ T7962] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.200162][ T7962] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.233033][ T7962] device bridge_slave_1 entered promiscuous mode [ 67.263641][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.273210][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.303410][ T2947] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.310482][ T2947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.363505][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.393032][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.423697][ T2947] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.430756][ T2947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.463520][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 14:54:22 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='memory.swap.max\x00', 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)={'Kyz1'}, 0x1) [ 67.504020][ T7960] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.538942][ T7991] IPVS: ftp: loaded support on port[0] = 21 [ 67.573449][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.592519][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.624559][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.664710][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.692848][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.733312][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.764316][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.795795][ T7957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.851808][ T7957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.888573][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.914002][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.974915][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.022249][ T7962] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.034317][ T7960] team0: Port device team_slave_0 added [ 68.037804][ T7994] IPVS: ftp: loaded support on port[0] = 21 [ 68.042672][ T7960] team0: Port device team_slave_1 added [ 68.069339][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.091881][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 68.108592][ T7957] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.123711][ T7962] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:54:23 executing program 5: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x100) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) epoll_create1(0x0) r5 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) bind$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r6, &(0x7f0000008a80), 0x400000000000328, 0x0) listen(r5, 0x27) [ 68.194141][ T7962] team0: Port device team_slave_0 added [ 68.234135][ T7960] device hsr_slave_0 entered promiscuous mode [ 68.262097][ T7960] device hsr_slave_1 entered promiscuous mode [ 68.301745][ T7960] debugfs: Directory 'hsr0' with parent '/' already present! [ 68.315911][ T7962] team0: Port device team_slave_1 added [ 68.396134][ T7962] device hsr_slave_0 entered promiscuous mode [ 68.453206][ T7962] device hsr_slave_1 entered promiscuous mode [ 68.491728][ T7962] debugfs: Directory 'hsr0' with parent '/' already present! [ 68.599841][ T8008] IPVS: ftp: loaded support on port[0] = 21 [ 68.665113][ T7991] chnl_net:caif_netlink_parms(): no params data found [ 68.887057][ T7994] chnl_net:caif_netlink_parms(): no params data found 14:54:23 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/29, 0x1d}], 0x1) [ 69.152229][ T7991] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.159298][ T7991] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.232680][ T7991] device bridge_slave_0 entered promiscuous mode [ 69.288332][ T7962] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.334242][ T7960] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.364401][ T7991] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.371503][ T7991] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.422544][ T7991] device bridge_slave_1 entered promiscuous mode 14:54:24 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/29, 0x1d}], 0x1) [ 69.482414][ T7962] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.503262][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.511151][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.585413][ T7960] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.605890][ T7994] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.613938][ T7994] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.662136][ T7994] device bridge_slave_0 entered promiscuous mode [ 69.715221][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.723303][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.775018][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 14:54:24 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/29, 0x1d}], 0x1) [ 69.822241][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.904074][ T3501] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.911196][ T3501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.015226][ T8008] chnl_net:caif_netlink_parms(): no params data found [ 70.037802][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.051694][ T7994] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.059457][ T7994] device bridge_slave_1 entered promiscuous mode 14:54:25 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/29, 0x1d}], 0x1) [ 70.186930][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.222674][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.243608][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.266811][ T3501] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.273915][ T3501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.377024][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.455578][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.502092][ T3501] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.509167][ T3501] bridge0: port 2(bridge_slave_1) entered forwarding state 14:54:25 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/29, 0x1d}], 0x1) [ 70.591003][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.656322][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.702919][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.735343][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.782052][ T3501] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.789154][ T3501] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.847057][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.923807][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.956802][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 14:54:25 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/29, 0x1d}], 0x1) [ 71.035392][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.090463][ T7960] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 71.164923][ T7960] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 71.217031][ T7991] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.259233][ T7962] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 71.353444][ T7962] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 14:54:26 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/29, 0x1d}], 0x1) [ 71.413067][ T7994] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.465726][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.486447][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.550954][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.593729][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.641150][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.699733][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.741235][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.787869][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.853690][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.893637][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.909930][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.933831][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.965584][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.981422][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.011341][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.044673][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.065566][ T7991] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.088902][ T7994] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.098481][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.107058][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.114942][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.122490][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.129939][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.139012][ T7960] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.167924][ T7991] team0: Port device team_slave_0 added [ 72.179038][ T7991] team0: Port device team_slave_1 added [ 72.191926][ T8008] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.198961][ T8008] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.207257][ T8008] device bridge_slave_0 entered promiscuous mode [ 72.219378][ T8008] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.226620][ T8008] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.234807][ T8008] device bridge_slave_1 entered promiscuous mode [ 72.293630][ T7991] device hsr_slave_0 entered promiscuous mode [ 72.332160][ T7991] device hsr_slave_1 entered promiscuous mode [ 72.382014][ T7991] debugfs: Directory 'hsr0' with parent '/' already present! [ 72.390428][ T7994] team0: Port device team_slave_0 added [ 72.402513][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.411994][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.427534][ T8008] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.438621][ T7962] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.463191][ T7994] team0: Port device team_slave_1 added [ 72.483579][ T8008] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.574515][ T7994] device hsr_slave_0 entered promiscuous mode [ 72.602382][ T7994] device hsr_slave_1 entered promiscuous mode [ 72.609206][ C1] hrtimer: interrupt took 25113 ns [ 72.675888][ T7994] debugfs: Directory 'hsr0' with parent '/' already present! [ 72.699733][ T8008] team0: Port device team_slave_0 added [ 72.738937][ T8008] team0: Port device team_slave_1 added 14:54:27 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000680)={r2, r3, r2}, &(0x7f0000000600)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f00000006c0)={'rmd160\x00'}}) [ 72.974276][ T8008] device hsr_slave_0 entered promiscuous mode [ 73.012351][ T8008] device hsr_slave_1 entered promiscuous mode [ 73.122040][ T8008] debugfs: Directory 'hsr0' with parent '/' already present! [ 73.304725][ T7991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.404632][ T7880] ================================================================== [ 73.412784][ T7880] BUG: KCSAN: data-race in generic_permission / kernfs_refresh_inode [ 73.420837][ T7880] [ 73.423177][ T7880] write to 0xffff88812a7236d8 of 2 bytes by task 7965 on cpu 1: [ 73.430815][ T7880] kernfs_refresh_inode+0x42/0x140 [ 73.435931][ T7880] kernfs_iop_permission+0x66/0xa0 [ 73.441052][ T7880] inode_permission+0x241/0x3c0 [ 73.445914][ T7880] link_path_walk.part.0+0x622/0xa90 [ 73.451210][ T7880] path_lookupat.isra.0+0x77/0x5a0 [ 73.456331][ T7880] filename_lookup+0x145/0x2b0 [ 73.461106][ T7880] user_path_at_empty+0x4c/0x70 [ 73.465962][ T7880] vfs_statx+0xd9/0x190 [ 73.470136][ T7880] __do_sys_newstat+0x51/0xb0 [ 73.474839][ T7880] __x64_sys_newstat+0x3a/0x50 [ 73.479628][ T7880] do_syscall_64+0xcc/0x370 [ 73.484146][ T7880] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.490029][ T7880] [ 73.492370][ T7880] read to 0xffff88812a7236d8 of 2 bytes by task 7880 on cpu 0: [ 73.499932][ T7880] generic_permission+0x36/0x3d0 [ 73.504878][ T7880] kernfs_iop_permission+0x7d/0xa0 [ 73.510006][ T7880] inode_permission+0x241/0x3c0 [ 73.514863][ T7880] link_path_walk.part.0+0x622/0xa90 [ 73.520160][ T7880] path_lookupat.isra.0+0x77/0x5a0 [ 73.525283][ T7880] filename_lookup+0x145/0x2b0 [ 73.530050][ T7880] user_path_at_empty+0x4c/0x70 [ 73.534900][ T7880] do_readlinkat+0x84/0x220 [ 73.539415][ T7880] __x64_sys_readlink+0x51/0x70 [ 73.544284][ T7880] do_syscall_64+0xcc/0x370 [ 73.548811][ T7880] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.554696][ T7880] [ 73.557021][ T7880] Reported by Kernel Concurrency Sanitizer on: [ 73.563186][ T7880] CPU: 0 PID: 7880 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 73.570198][ T7880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.580248][ T7880] ================================================================== [ 73.588319][ T7880] Kernel panic - not syncing: panic_on_warn set ... [ 73.594915][ T7880] CPU: 0 PID: 7880 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 73.601940][ T7880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.611997][ T7880] Call Trace: [ 73.615388][ T7880] dump_stack+0xf5/0x159 [ 73.619642][ T7880] panic+0x210/0x640 [ 73.623559][ T7880] ? vprintk_func+0x8d/0x140 [ 73.628163][ T7880] kcsan_report.cold+0xc/0xe [ 73.632762][ T7880] kcsan_setup_watchpoint+0x3fe/0x410 [ 73.638147][ T7880] __tsan_read2+0x145/0x1f0 [ 73.642662][ T7880] generic_permission+0x36/0x3d0 [ 73.647607][ T7880] kernfs_iop_permission+0x7d/0xa0 [ 73.652731][ T7880] ? kernfs_iop_getattr+0x90/0x90 [ 73.657764][ T7880] inode_permission+0x241/0x3c0 [ 73.662634][ T7880] link_path_walk.part.0+0x622/0xa90 [ 73.667934][ T7880] ? native_set_pte+0x47/0x70 [ 73.672731][ T7880] path_lookupat.isra.0+0x77/0x5a0 [ 73.677850][ T7880] ? __read_once_size.constprop.0+0x12/0x20 [ 73.684110][ T7880] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 73.690364][ T7880] filename_lookup+0x145/0x2b0 [ 73.695158][ T7880] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 73.701676][ T7880] ? strncpy_from_user+0x219/0x2b0 [ 73.706810][ T7880] ? getname_flags+0x1a4/0x380 [ 73.711584][ T7880] user_path_at_empty+0x4c/0x70 [ 73.716443][ T7880] do_readlinkat+0x84/0x220 [ 73.720966][ T7880] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 73.727219][ T7880] __x64_sys_readlink+0x51/0x70 [ 73.732085][ T7880] do_syscall_64+0xcc/0x370 [ 73.736604][ T7880] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.742499][ T7880] RIP: 0033:0x7fb97cfd6577 [ 73.746930][ T7880] Code: f0 ff ff 77 02 f3 c3 48 8b 15 bd 38 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 90 90 b8 59 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 91 38 2b 00 31 d2 48 29 c2 64 [ 73.766566][ T7880] RSP: 002b:00007ffc49b193c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 73.774985][ T7880] RAX: ffffffffffffffda RBX: 0000000000d95250 RCX: 00007fb97cfd6577 [ 73.782961][ T7880] RDX: 0000000000000400 RSI: 00007ffc49b193d0 RDI: 00007ffc49b198b0 [ 73.790935][ T7880] RBP: 0000000000da5550 R08: 7665642f7379732f R09: 74656e2f73656369 [ 73.798906][ T7880] R10: 2f356d6973766564 R11: 0000000000000246 R12: 00007ffc49b198b0 [ 73.806880][ T7880] R13: 0000000000000400 R14: 0000000000d95250 R15: 000000000000000b [ 73.816248][ T7880] Kernel Offset: disabled [ 73.820574][ T7880] Rebooting in 86400 seconds..