[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.436768][ T26] audit: type=1800 audit(1572278933.957:25): pid=7021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.456983][ T26] audit: type=1800 audit(1572278933.957:26): pid=7021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 35.478827][ T26] audit: type=1800 audit(1572278933.957:27): pid=7021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.14' (ECDSA) to the list of known hosts. 2019/10/28 16:09:06 fuzzer started 2019/10/28 16:09:08 dialing manager at 10.128.0.105:45117 2019/10/28 16:09:08 syscalls: 2540 2019/10/28 16:09:08 code coverage: enabled 2019/10/28 16:09:08 comparison tracing: enabled 2019/10/28 16:09:08 extra coverage: extra coverage is not supported by the kernel 2019/10/28 16:09:08 setuid sandbox: enabled 2019/10/28 16:09:08 namespace sandbox: enabled 2019/10/28 16:09:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/28 16:09:08 fault injection: enabled 2019/10/28 16:09:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/28 16:09:08 net packet injection: enabled 2019/10/28 16:09:08 net device setup: enabled 2019/10/28 16:09:08 concurrency sanitizer: enabled 2019/10/28 16:09:11 adding functions to KCSAN blacklist: 'rcu_gp_fqs_loop' '__tcp_select_window' 'tcp_add_backlog' 'pid_update_inode' 'tick_sched_do_timer' 'blk_mq_sched_dispatch_requests' '__nf_conntrack_find_get' 'ep_poll' '__hrtimer_run_queues' 16:09:13 executing program 0: socketpair$unix(0x1, 0x41fcd35b873d17b1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x2, 0x0, 0x0, @time={0x0, 0x989680}}], 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000940)='.+\x02\x06}f', 0x0, &(0x7f00000009c0)="50e589db515ae69ad253c31a97948623acebf239460b8ade5ea06c3a932b7038fe5506d1359ab5e3b8fb588cc1fbf0ce1266d6931f513de85ce4ffaae52112395f82526c877ccc6021e8cd935cfe731ad123d46549cefdc5de64b440d9370a55f8e4a6e31a48c04e653bd77289bd70c082b19606ddcc20ceea903c8f1f1ad98deb47fb48c281ee6f6bcd6f51443e4b3ee9dcfdec6c63a8e0685f65ba0c024f55ee0f95731dabc0ddd37841b0cdd4e2521248e2c58fe489e05f701c9ddc750140396301e34fc4f73d4a9de52ddc4fa6f095ecef84f9f0afdc42806b65eb42d909d87a10dd2cfe098c4972e9ef8bc1d31f", 0xffffffffffffff2f, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba1eea10e6ddb915ceb6", 0x3b}], 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f00000002c0)={{0x63a5, 0x1000}, 'port0\x00', 0x98, 0x1000, 0xfffffffffffffa82, 0x3f, 0x8, 0x38000, 0x800, 0x0, 0x2, 0xffffffffffffffc0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) syzkaller login: [ 55.247624][ T7189] IPVS: ftp: loaded support on port[0] = 21 16:09:13 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000000)={0x5, 0x8, [0x0, 0x0]}) [ 55.354532][ T7189] chnl_net:caif_netlink_parms(): no params data found [ 55.435654][ T7189] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.443709][ T7189] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.452100][ T7189] device bridge_slave_0 entered promiscuous mode [ 55.461323][ T7189] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.468818][ T7189] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.477157][ T7189] device bridge_slave_1 entered promiscuous mode [ 55.499845][ T7189] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.511200][ T7189] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.543081][ T7189] team0: Port device team_slave_0 added [ 55.551077][ T7189] team0: Port device team_slave_1 added 16:09:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) [ 55.619351][ T7189] device hsr_slave_0 entered promiscuous mode [ 55.706477][ T7189] device hsr_slave_1 entered promiscuous mode [ 55.785642][ T7192] IPVS: ftp: loaded support on port[0] = 21 [ 55.863189][ T7189] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.870359][ T7189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.877742][ T7189] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.884845][ T7189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.998257][ T7194] IPVS: ftp: loaded support on port[0] = 21 [ 56.199508][ T7189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.298159][ T7189] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.305523][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.346869][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.366495][ T44] bridge0: port 2(bridge_slave_1) entered disabled state 16:09:14 executing program 3: syz_init_net_socket$ax25(0x9, 0x5, 0x15c) [ 56.407810][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 56.498078][ T7221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.517235][ T7221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.556744][ T7221] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.563817][ T7221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.598430][ T7192] chnl_net:caif_netlink_parms(): no params data found [ 56.627577][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.666378][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.697607][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.704685][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.820129][ T7192] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.827459][ T7192] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.835491][ T7192] device bridge_slave_0 entered promiscuous mode [ 56.843977][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.868186][ T7192] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.875261][ T7192] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.917681][ T7192] device bridge_slave_1 entered promiscuous mode [ 56.990715][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.007870][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.036967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.068866][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.097377][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.128843][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.157278][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.212295][ T7192] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.226529][ T7225] IPVS: ftp: loaded support on port[0] = 21 [ 57.288083][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.309227][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 57.348575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.368757][ T7194] chnl_net:caif_netlink_parms(): no params data found [ 57.395306][ T7189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.429974][ T7192] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:09:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b00)=@acquire={0x134, 0x17, 0x209, 0x0, 0x0, {{@in=@dev}, @in6=@local, {@in6, @in6=@remote}, {{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x181ee4cfb2921577}}]}, 0x134}}, 0x0) [ 57.552079][ T7192] team0: Port device team_slave_0 added [ 57.638637][ T7189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.647457][ T7192] team0: Port device team_slave_1 added [ 57.726010][ T7194] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.741077][ T7194] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.783483][ T7194] device bridge_slave_0 entered promiscuous mode [ 57.821919][ T7194] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.858966][ T7194] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.880336][ T7194] device bridge_slave_1 entered promiscuous mode [ 57.999132][ T7192] device hsr_slave_0 entered promiscuous mode [ 58.036672][ T7192] device hsr_slave_1 entered promiscuous mode [ 58.076217][ T7192] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.120371][ T7237] IPVS: ftp: loaded support on port[0] = 21 [ 58.129635][ T7194] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.162634][ T7225] chnl_net:caif_netlink_parms(): no params data found [ 58.179236][ T7194] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:09:16 executing program 5: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) [ 58.388856][ T7194] team0: Port device team_slave_0 added [ 58.396497][ C0] hrtimer: interrupt took 31360 ns [ 58.443987][ T7194] team0: Port device team_slave_1 added [ 58.473365][ T7225] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.505210][ T7225] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.542136][ T7225] device bridge_slave_0 entered promiscuous mode [ 58.607215][ T7225] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.619751][ T7225] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.657214][ T7225] device bridge_slave_1 entered promiscuous mode [ 58.739396][ T7194] device hsr_slave_0 entered promiscuous mode [ 58.806564][ T7194] device hsr_slave_1 entered promiscuous mode [ 58.846222][ T7194] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.914806][ T7192] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.004528][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.030797][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.069019][ T7225] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.120669][ T7225] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.224870][ T7192] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.343102][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.363279][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.396823][ T3006] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.404024][ T3006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.476894][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.525477][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.576642][ T3006] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.583736][ T3006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.652569][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.698537][ T7225] team0: Port device team_slave_0 added [ 59.731297][ T7284] IPVS: ftp: loaded support on port[0] = 21 [ 59.733885][ T7237] chnl_net:caif_netlink_parms(): no params data found [ 59.748629][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.769725][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.816909][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.869593][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.910552][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.956630][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.005629][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.041143][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.088438][ T7225] team0: Port device team_slave_1 added [ 60.110710][ T7192] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.160427][ T7192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.200908][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.218559][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.255793][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.409624][ T7225] device hsr_slave_0 entered promiscuous mode [ 60.446544][ T7225] device hsr_slave_1 entered promiscuous mode [ 60.466235][ T7225] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.488671][ T7192] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.557025][ T7194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.629572][ T7237] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.653440][ T7237] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.693149][ T7237] device bridge_slave_0 entered promiscuous mode [ 60.768321][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.795706][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.859067][ T7237] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.881196][ T7237] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.938357][ T7237] device bridge_slave_1 entered promiscuous mode [ 60.998694][ T7194] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.069679][ T7237] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.168891][ T7237] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.236069][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.278437][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.337053][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.344138][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.430864][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.586237][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.595185][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.646709][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.653788][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.706956][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.756543][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.807701][ T7225] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.862361][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.871891][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.899127][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.927076][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.936111][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.964994][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.989472][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.016852][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.026332][ T7237] team0: Port device team_slave_0 added [ 62.032890][ T7194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.052942][ T7225] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.081150][ T7284] chnl_net:caif_netlink_parms(): no params data found [ 62.099964][ T7237] team0: Port device team_slave_1 added [ 62.114493][ T7194] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.142061][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.151228][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.187013][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.275610][ T7225] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 62.297166][ T7225] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.354678][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.365631][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.421267][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.428423][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.447257][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.476585][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.485535][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.492676][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.546872][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.576995][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.607241][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.647055][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.686765][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.695886][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.746382][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.755227][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.797716][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.827035][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.869276][ T7237] device hsr_slave_0 entered promiscuous mode [ 62.906517][ T7237] device hsr_slave_1 entered promiscuous mode [ 62.946199][ T7237] debugfs: Directory 'hsr0' with parent '/' already present! [ 62.987240][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.995715][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.028097][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.076930][ T7225] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.086661][ T7284] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.093732][ T7284] bridge0: port 1(bridge_slave_0) entered disabled state 16:09:21 executing program 0: socketpair$unix(0x1, 0x41fcd35b873d17b1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x2, 0x0, 0x0, @time={0x0, 0x989680}}], 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000940)='.+\x02\x06}f', 0x0, &(0x7f00000009c0)="50e589db515ae69ad253c31a97948623acebf239460b8ade5ea06c3a932b7038fe5506d1359ab5e3b8fb588cc1fbf0ce1266d6931f513de85ce4ffaae52112395f82526c877ccc6021e8cd935cfe731ad123d46549cefdc5de64b440d9370a55f8e4a6e31a48c04e653bd77289bd70c082b19606ddcc20ceea903c8f1f1ad98deb47fb48c281ee6f6bcd6f51443e4b3ee9dcfdec6c63a8e0685f65ba0c024f55ee0f95731dabc0ddd37841b0cdd4e2521248e2c58fe489e05f701c9ddc750140396301e34fc4f73d4a9de52ddc4fa6f095ecef84f9f0afdc42806b65eb42d909d87a10dd2cfe098c4972e9ef8bc1d31f", 0xffffffffffffff2f, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba1eea10e6ddb915ceb6", 0x3b}], 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f00000002c0)={{0x63a5, 0x1000}, 'port0\x00', 0x98, 0x1000, 0xfffffffffffffa82, 0x3f, 0x8, 0x38000, 0x800, 0x0, 0x2, 0xffffffffffffffc0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 63.218703][ T7284] device bridge_slave_0 entered promiscuous mode [ 63.308814][ T7284] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.386240][ T7284] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.454297][ T7284] device bridge_slave_1 entered promiscuous mode 16:09:22 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000000)={0x5, 0x8, [0x0, 0x0]}) [ 63.791389][ T7284] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.925257][ T7284] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.173767][ T7284] team0: Port device team_slave_0 added 16:09:22 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000000)={0x5, 0x8, [0x0, 0x0]}) [ 64.337214][ T7284] team0: Port device team_slave_1 added [ 64.717543][ T7237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.789751][ T7284] device hsr_slave_0 entered promiscuous mode 16:09:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) [ 64.838832][ T7284] device hsr_slave_1 entered promiscuous mode 16:09:23 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000000)={0x5, 0x8, [0x0, 0x0]}) [ 64.956286][ T7284] debugfs: Directory 'hsr0' with parent '/' already present! [ 65.017329][ T7237] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.117990][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 16:09:23 executing program 3: syz_init_net_socket$ax25(0x9, 0x5, 0x15c) [ 65.257071][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.395568][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.465380][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.630165][ T7317] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.637319][ T7317] bridge0: port 1(bridge_slave_0) entered forwarding state 16:09:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) [ 65.867105][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.875857][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 16:09:24 executing program 3: syz_init_net_socket$ax25(0x9, 0x5, 0x15c) [ 66.016408][ T7317] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.023521][ T7317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.197162][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.275259][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.312240][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.385010][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 16:09:25 executing program 0: socketpair$unix(0x1, 0x41fcd35b873d17b1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x2, 0x0, 0x0, @time={0x0, 0x989680}}], 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000940)='.+\x02\x06}f', 0x0, &(0x7f00000009c0)="50e589db515ae69ad253c31a97948623acebf239460b8ade5ea06c3a932b7038fe5506d1359ab5e3b8fb588cc1fbf0ce1266d6931f513de85ce4ffaae52112395f82526c877ccc6021e8cd935cfe731ad123d46549cefdc5de64b440d9370a55f8e4a6e31a48c04e653bd77289bd70c082b19606ddcc20ceea903c8f1f1ad98deb47fb48c281ee6f6bcd6f51443e4b3ee9dcfdec6c63a8e0685f65ba0c024f55ee0f95731dabc0ddd37841b0cdd4e2521248e2c58fe489e05f701c9ddc750140396301e34fc4f73d4a9de52ddc4fa6f095ecef84f9f0afdc42806b65eb42d909d87a10dd2cfe098c4972e9ef8bc1d31f", 0xffffffffffffff2f, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba1eea10e6ddb915ceb6", 0x3b}], 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f00000002c0)={{0x63a5, 0x1000}, 'port0\x00', 0x98, 0x1000, 0xfffffffffffffa82, 0x3f, 0x8, 0x38000, 0x800, 0x0, 0x2, 0xffffffffffffffc0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 66.448679][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.516470][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 16:09:25 executing program 3: syz_init_net_socket$ax25(0x9, 0x5, 0x15c) [ 66.583137][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.677011][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.742470][ T7237] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.829462][ T7237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.884729][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.903637][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.961408][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.036991][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.165811][ T7237] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.358382][ T7284] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.477022][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.485025][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.549141][ T7284] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.676856][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.685681][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.746941][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.754106][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.826913][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.835926][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.897161][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.904245][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.986960][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 68.026914][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 68.066539][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 68.075473][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.135833][ T7284] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 68.206194][ T7284] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.295217][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.337109][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.345622][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.434387][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.527476][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.536041][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.624740][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 16:09:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b00)=@acquire={0x134, 0x17, 0x209, 0x0, 0x0, {{@in=@dev}, @in6=@local, {@in6, @in6=@remote}, {{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x181ee4cfb2921577}}]}, 0x134}}, 0x0) [ 68.669193][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.738533][ T7284] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.751456][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 16:09:28 executing program 0: socketpair$unix(0x1, 0x41fcd35b873d17b1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x2, 0x0, 0x0, @time={0x0, 0x989680}}], 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000940)='.+\x02\x06}f', 0x0, &(0x7f00000009c0)="50e589db515ae69ad253c31a97948623acebf239460b8ade5ea06c3a932b7038fe5506d1359ab5e3b8fb588cc1fbf0ce1266d6931f513de85ce4ffaae52112395f82526c877ccc6021e8cd935cfe731ad123d46549cefdc5de64b440d9370a55f8e4a6e31a48c04e653bd77289bd70c082b19606ddcc20ceea903c8f1f1ad98deb47fb48c281ee6f6bcd6f51443e4b3ee9dcfdec6c63a8e0685f65ba0c024f55ee0f95731dabc0ddd37841b0cdd4e2521248e2c58fe489e05f701c9ddc750140396301e34fc4f73d4a9de52ddc4fa6f095ecef84f9f0afdc42806b65eb42d909d87a10dd2cfe098c4972e9ef8bc1d31f", 0xffffffffffffff2f, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba1eea10e6ddb915ceb6", 0x3b}], 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f00000002c0)={{0x63a5, 0x1000}, 'port0\x00', 0x98, 0x1000, 0xfffffffffffffa82, 0x3f, 0x8, 0x38000, 0x800, 0x0, 0x2, 0xffffffffffffffc0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 16:09:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) 16:09:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) 16:09:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) 16:09:28 executing program 5: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b00)=@acquire={0x134, 0x17, 0x209, 0x0, 0x0, {{@in=@dev}, @in6=@local, {@in6, @in6=@remote}, {{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x181ee4cfb2921577}}]}, 0x134}}, 0x0) 16:09:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b00)=@acquire={0x134, 0x17, 0x209, 0x0, 0x0, {{@in=@dev}, @in6=@local, {@in6, @in6=@remote}, {{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x181ee4cfb2921577}}]}, 0x134}}, 0x0) 16:09:28 executing program 5: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:28 executing program 4: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:28 executing program 5: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) 16:09:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) 16:09:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) 16:09:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) 16:09:31 executing program 4: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:31 executing program 5: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:31 executing program 2: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:31 executing program 1: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:31 executing program 5: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:31 executing program 2: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:31 executing program 4: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:31 executing program 1: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:31 executing program 5: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:31 executing program 2: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) 16:09:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) 16:09:32 executing program 1: r0 = userfaultfd(0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) 16:09:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x4000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) [ 73.598217][ T7567] ================================================================== [ 73.606347][ T7567] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 73.614056][ T7567] [ 73.616392][ T7567] write to 0xffffffff86146f24 of 4 bytes by task 7156 on cpu 0: [ 73.624020][ T7567] tomoyo_supervisor+0x1c9/0xd20 [ 73.629130][ T7567] tomoyo_path2_perm+0x44a/0x4c0 [ 73.634065][ T7567] tomoyo_path_rename+0x95/0xd0 [ 73.638920][ T7567] security_path_rename+0x17e/0x1e0 [ 73.644132][ T7567] do_renameat2+0x6ea/0xa50 [ 73.648631][ T7567] __x64_sys_rename+0x47/0x60 [ 73.653304][ T7567] do_syscall_64+0xcc/0x370 [ 73.657802][ T7567] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.663686][ T7567] [ 73.666011][ T7567] read to 0xffffffff86146f24 of 4 bytes by task 7567 on cpu 1: [ 73.673556][ T7567] tomoyo_supervisor+0x1b0/0xd20 [ 73.678496][ T7567] tomoyo_path_permission+0x121/0x160 [ 73.683868][ T7567] tomoyo_path_perm+0x2c6/0x390 [ 73.688715][ T7567] tomoyo_path_symlink+0x69/0xa0 [ 73.693649][ T7567] security_path_symlink+0xab/0xe0 [ 73.698757][ T7567] do_symlinkat+0xcd/0x1e0 [ 73.703157][ T7567] __x64_sys_symlink+0x3f/0x50 [ 73.707914][ T7567] do_syscall_64+0xcc/0x370 [ 73.712409][ T7567] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.718309][ T7567] [ 73.720626][ T7567] Reported by Kernel Concurrency Sanitizer on: [ 73.726779][ T7567] CPU: 1 PID: 7567 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 73.734573][ T7567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.744633][ T7567] ================================================================== [ 73.752685][ T7567] Kernel panic - not syncing: panic_on_warn set ... [ 73.759272][ T7567] CPU: 1 PID: 7567 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 73.767152][ T7567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.777200][ T7567] Call Trace: [ 73.780494][ T7567] dump_stack+0xf5/0x159 [ 73.784731][ T7567] panic+0x210/0x640 [ 73.788637][ T7567] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.794705][ T7567] ? vprintk_func+0x8d/0x140 [ 73.799328][ T7567] kcsan_report.cold+0xc/0x10 [ 73.804012][ T7567] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 73.809552][ T7567] __tsan_read4+0x2c/0x30 [ 73.813889][ T7567] tomoyo_supervisor+0x1b0/0xd20 [ 73.818828][ T7567] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 73.824556][ T7567] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 73.830194][ T7567] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 73.835834][ T7567] tomoyo_path_permission+0x121/0x160 [ 73.841217][ T7567] tomoyo_path_perm+0x2c6/0x390 [ 73.846088][ T7567] tomoyo_path_symlink+0x69/0xa0 [ 73.851036][ T7567] security_path_symlink+0xab/0xe0 [ 73.856151][ T7567] do_symlinkat+0xcd/0x1e0 [ 73.860570][ T7567] __x64_sys_symlink+0x3f/0x50 [ 73.865331][ T7567] do_syscall_64+0xcc/0x370 [ 73.869848][ T7567] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.875841][ T7567] RIP: 0033:0x459c67 [ 73.879769][ T7567] Code: 0f 1f 00 b8 5c 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 6d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 73.899370][ T7567] RSP: 002b:00007ffc5296d4f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000058 [ 73.907786][ T7567] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459c67 [ 73.915760][ T7567] RDX: 00007ffc5296d593 RSI: 00000000004bf946 RDI: 00007ffc5296d580 [ 73.923821][ T7567] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000013 [ 73.931794][ T7567] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000000 [ 73.939851][ T7567] R13: 00007ffc5296d530 R14: 0000000000000000 R15: 00007ffc5296d540 [ 73.949391][ T7567] Kernel Offset: disabled [ 73.953741][ T7567] Rebooting in 86400 seconds..