[ 52.379941][ T26] audit: type=1800 audit(1573051810.963:27): pid=7886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 52.401956][ T26] audit: type=1800 audit(1573051810.963:28): pid=7886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.109413][ T26] audit: type=1800 audit(1573051811.733:29): pid=7886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 53.129608][ T26] audit: type=1800 audit(1573051811.733:30): pid=7886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.195' (ECDSA) to the list of known hosts. 2019/11/06 14:50:21 fuzzer started 2019/11/06 14:50:23 dialing manager at 10.128.0.105:44951 2019/11/06 14:50:23 syscalls: 2553 2019/11/06 14:50:23 code coverage: enabled 2019/11/06 14:50:23 comparison tracing: enabled 2019/11/06 14:50:23 extra coverage: extra coverage is not supported by the kernel 2019/11/06 14:50:23 setuid sandbox: enabled 2019/11/06 14:50:23 namespace sandbox: enabled 2019/11/06 14:50:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 14:50:23 fault injection: enabled 2019/11/06 14:50:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 14:50:23 net packet injection: enabled 2019/11/06 14:50:23 net device setup: enabled 2019/11/06 14:50:23 concurrency sanitizer: enabled 2019/11/06 14:50:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/06 14:50:27 adding functions to KCSAN blacklist: 'find_next_bit' 'tick_do_update_jiffies64' 'do_nanosleep' 'dd_has_work' 'echo_char' 'pipe_poll' 'tcp_add_backlog' '__skb_try_recv_from_queue' 'ep_poll' 'generic_permission' 'rcu_gp_fqs_check_wake' '__hrtimer_run_queues' 'pid_update_inode' 'tomoyo_supervisor' 'blk_mq_dispatch_rq_list' 'wbt_done' 'ktime_get_real_seconds' 14:50:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x8, 0x18, @str='\x02\xac\x0f\x00me_type\x00'}]}, 0x269}}, 0x0) 14:50:33 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f0000000000)=0x16c, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x2f) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) syzkaller login: [ 75.187192][ T8058] IPVS: ftp: loaded support on port[0] = 21 [ 75.333781][ T8058] chnl_net:caif_netlink_parms(): no params data found [ 75.371972][ T8061] IPVS: ftp: loaded support on port[0] = 21 [ 75.393496][ T8058] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.400690][ T8058] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.408572][ T8058] device bridge_slave_0 entered promiscuous mode [ 75.431480][ T8058] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.438715][ T8058] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.448330][ T8058] device bridge_slave_1 entered promiscuous mode [ 75.482109][ T8058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:50:34 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1b, 0x0, 0x60}}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000e6d000)=""/384, 0x180) [ 75.493504][ T8058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.547955][ T8058] team0: Port device team_slave_0 added [ 75.560340][ T8061] chnl_net:caif_netlink_parms(): no params data found [ 75.577182][ T8058] team0: Port device team_slave_1 added [ 75.692691][ T8058] device hsr_slave_0 entered promiscuous mode [ 75.730258][ T8058] device hsr_slave_1 entered promiscuous mode 14:50:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001fc0)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcf\x00\x00\x00\x00\x1aO\xb4\xf0_\xbd>\xf3\x1b\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba\xa9\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x00\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/\x94 J\xc8x\xb6#a\xa5[\xbe\x0f\xe1\xf1=\xdd\xfb\xcb\xb0\xe5\xfd\x10wxF\x93\x03cK\r\xb6%\xa6\x0e\xfa\xcd\x18\xe0\x1e\xae\xc5\xa2\xe1*)\xb7]\x99\x83\xe8\xc3\xc1\xb9\x1d0\x9c\x98\xadRm', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x81, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r2, &(0x7f00000002c0)=ANY=[], 0xae9d8214) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3}) read(r2, &(0x7f00000000c0)=""/19, 0x79e2494) read(r3, &(0x7f0000002780)=""/4096, 0x112c) [ 75.801559][ T8061] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.808618][ T8061] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.830877][ T8061] device bridge_slave_0 entered promiscuous mode [ 75.864518][ T8064] IPVS: ftp: loaded support on port[0] = 21 [ 75.890301][ T8061] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.897402][ T8061] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.934967][ T8061] device bridge_slave_1 entered promiscuous mode [ 76.060640][ T8061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.073180][ T8058] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.080272][ T8058] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.087687][ T8058] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.094770][ T8058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.154238][ T8061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.281531][ T8061] team0: Port device team_slave_0 added [ 76.288573][ T8061] team0: Port device team_slave_1 added [ 76.317863][ T8058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.374061][ T8090] IPVS: ftp: loaded support on port[0] = 21 [ 76.403669][ T8061] device hsr_slave_0 entered promiscuous mode 14:50:35 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="20000000100029bd5a00000000000000030000000c000100170000dfff000000"], 0x20}}, 0x0) r3 = socket(0x10, 0x800000000080002, 0x10) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 76.480247][ T8061] device hsr_slave_1 entered promiscuous mode [ 76.509930][ T8061] debugfs: Directory 'hsr0' with parent '/' already present! [ 76.542200][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.571094][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.600355][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.631552][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 76.678525][ T8058] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.791583][ T2879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.820605][ T2879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.860511][ T2879] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.867680][ T2879] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.987357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.008041][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.050915][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.058004][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.142035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.182254][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.222408][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.261930][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.291268][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.347386][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.382612][ T8064] chnl_net:caif_netlink_parms(): no params data found [ 77.438694][ T8103] IPVS: ftp: loaded support on port[0] = 21 [ 77.448117][ T2879] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.462267][ T2879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.513569][ T2879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.562177][ T2879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.610942][ T2879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.664914][ T8058] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:50:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x1e, 0x0, &(0x7f0000000140)="e46ace60ed090802f1a6eb2888ca10080000000000008bef71c119802d8f", 0x0, 0x1f}, 0x21) [ 77.912872][ T8064] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.943808][ T8064] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.002286][ T8064] device bridge_slave_0 entered promiscuous mode [ 78.041475][ T8064] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.048892][ T8064] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.130300][ T8064] device bridge_slave_1 entered promiscuous mode [ 78.153104][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.180276][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.192276][ T8090] chnl_net:caif_netlink_parms(): no params data found [ 78.308202][ T8058] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.368559][ T8090] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.409053][ T8090] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.433324][ T8090] device bridge_slave_0 entered promiscuous mode [ 78.473867][ T8064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.495995][ T8090] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.503824][ T8090] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.521014][ T8090] device bridge_slave_1 entered promiscuous mode [ 78.571884][ T8061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.588609][ T8129] IPVS: ftp: loaded support on port[0] = 21 [ 78.596885][ T8064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.649281][ T8061] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.688373][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.713706][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.746320][ T8090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.841960][ T8064] team0: Port device team_slave_0 added [ 78.848668][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.865373][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.887687][ T8137] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 78.900494][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.907538][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.936965][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.945753][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.962188][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.969287][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.999784][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 79.022554][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 79.044984][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 79.066614][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 79.089041][ T8103] chnl_net:caif_netlink_parms(): no params data found [ 79.107143][ T8090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.137322][ T8064] team0: Port device team_slave_1 added [ 79.158818][ T8089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.170880][ T8089] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 14:50:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x8, 0x18, @str='\x02\xac\x0f\x00me_type\x00'}]}, 0x269}}, 0x0) [ 79.204333][ T8089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 79.226712][ T8089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.285809][ T8061] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 79.309288][ T8145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 79.318648][ T8061] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 79.374428][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.386547][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.396165][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.407511][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.416446][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 79.433843][ T8090] team0: Port device team_slave_0 added [ 79.472248][ T8064] device hsr_slave_0 entered promiscuous mode [ 79.520333][ T8064] device hsr_slave_1 entered promiscuous mode [ 79.560019][ T8064] debugfs: Directory 'hsr0' with parent '/' already present! [ 79.585291][ T8103] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.592510][ T8103] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.600599][ T8103] device bridge_slave_0 entered promiscuous mode [ 79.612842][ T8090] team0: Port device team_slave_1 added 14:50:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x8, 0x18, @str='\x02\xac\x0f\x00me_type\x00'}]}, 0x269}}, 0x0) [ 79.641817][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.649272][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.660557][ T8061] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.668605][ T8103] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.680151][ T8103] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.695482][ T8103] device bridge_slave_1 entered promiscuous mode [ 79.755809][ T8103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.803151][ T8156] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 79.825893][ T8090] device hsr_slave_0 entered promiscuous mode [ 79.870245][ T8090] device hsr_slave_1 entered promiscuous mode [ 79.899941][ T8090] debugfs: Directory 'hsr0' with parent '/' already present! [ 79.914106][ T8103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.980632][ T8129] chnl_net:caif_netlink_parms(): no params data found [ 80.042640][ T8103] team0: Port device team_slave_0 added [ 80.128078][ T8103] team0: Port device team_slave_1 added 14:50:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x8, 0x18, @str='\x02\xac\x0f\x00me_type\x00'}]}, 0x269}}, 0x0) [ 80.390405][ T8129] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.397482][ T8129] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.465961][ T8129] device bridge_slave_0 entered promiscuous mode [ 80.557543][ T8064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.634915][ T8201] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 80.650959][ T8103] device hsr_slave_0 entered promiscuous mode [ 80.690286][ T8103] device hsr_slave_1 entered promiscuous mode [ 80.719936][ T8103] debugfs: Directory 'hsr0' with parent '/' already present! [ 80.757680][ T8129] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.775030][ T8129] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.829964][ T8129] device bridge_slave_1 entered promiscuous mode [ 80.908837][ T8064] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.987138][ T8100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.013323][ T8100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.088837][ T8090] 8021q: adding VLAN 0 to HW filter on device bond0 14:50:39 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f0000000000)=0x16c, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x2f) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 81.154374][ T8129] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.224539][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 81.249694][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.360293][ T8091] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.367372][ T8091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.480700][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 81.540510][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 81.560181][ T25] ================================================================== [ 81.568324][ T25] BUG: KCSAN: data-race in add_timer / run_timer_softirq [ 81.575348][ T25] [ 81.577678][ T25] write to 0xffff88812bf1b6c8 of 8 bytes by interrupt on cpu 1: [ 81.585304][ T25] run_timer_softirq+0x496/0xcd0 [ 81.590238][ T25] __do_softirq+0x115/0x33f [ 81.594742][ T25] irq_exit+0xbb/0xe0 [ 81.598732][ T25] smp_apic_timer_interrupt+0xe6/0x280 [ 81.604184][ T25] apic_timer_interrupt+0xf/0x20 [ 81.609114][ T25] kcsan_setup_watchpoint+0x205/0x410 [ 81.614476][ T25] __tsan_read8+0x145/0x1f0 [ 81.618975][ T25] path_openat+0x110e/0x36e0 [ 81.623553][ T25] do_filp_open+0x11e/0x1b0 [ 81.628049][ T25] do_sys_open+0x3b3/0x4f0 [ 81.632461][ T25] __x64_sys_open+0x55/0x70 [ 81.636961][ T25] do_syscall_64+0xcc/0x370 [ 81.641458][ T25] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 81.647333][ T25] [ 81.649668][ T25] read to 0xffff88812bf1b6c8 of 8 bytes by task 25 on cpu 0: [ 81.657031][ T25] add_timer+0x16f/0x550 [ 81.661284][ T25] __queue_delayed_work+0x13b/0x1d0 [ 81.666480][ T25] queue_delayed_work_on+0xf3/0x110 [ 81.671690][ T25] bond_netdev_notify_work+0x150/0x160 [ 81.677142][ T25] process_one_work+0x3d4/0x890 [ 81.681987][ T25] worker_thread+0xa0/0x800 [ 81.686482][ T25] kthread+0x1d4/0x200 [ 81.690553][ T25] ret_from_fork+0x1f/0x30 [ 81.695045][ T25] [ 81.697362][ T25] Reported by Kernel Concurrency Sanitizer on: [ 81.703509][ T25] CPU: 0 PID: 25 Comm: kworker/u4:2 Not tainted 5.4.0-rc6+ #0 [ 81.710971][ T25] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.721059][ T25] Workqueue: bond0 bond_netdev_notify_work [ 81.726867][ T25] ================================================================== [ 81.735790][ T25] Kernel panic - not syncing: panic_on_warn set ... [ 81.742377][ T25] CPU: 0 PID: 25 Comm: kworker/u4:2 Not tainted 5.4.0-rc6+ #0 [ 81.749820][ T25] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.759979][ T25] Workqueue: bond0 bond_netdev_notify_work [ 81.765774][ T25] Call Trace: [ 81.769068][ T25] dump_stack+0xf5/0x159 [ 81.773308][ T25] panic+0x210/0x640 [ 81.777207][ T25] ? vprintk_func+0x8d/0x140 [ 81.781808][ T25] kcsan_report.cold+0xc/0xe [ 81.786405][ T25] kcsan_setup_watchpoint+0x3fe/0x410 [ 81.791773][ T25] __tsan_read8+0x145/0x1f0 [ 81.796277][ T25] add_timer+0x16f/0x550 [ 81.800528][ T25] __queue_delayed_work+0x13b/0x1d0 [ 81.805728][ T25] queue_delayed_work_on+0xf3/0x110 [ 81.810928][ T25] bond_netdev_notify_work+0x150/0x160 [ 81.816386][ T25] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 81.822283][ T25] process_one_work+0x3d4/0x890 [ 81.828618][ T25] worker_thread+0xa0/0x800 [ 81.833130][ T25] kthread+0x1d4/0x200 [ 81.837197][ T25] ? rescuer_thread+0x6a0/0x6a0 [ 81.842040][ T25] ? kthread_stop+0x2d0/0x2d0 [ 81.846718][ T25] ret_from_fork+0x1f/0x30 [ 82.989337][ T25] Shutting down cpus with NMI [ 82.995411][ T25] Kernel Offset: disabled [ 82.999748][ T25] Rebooting in 86400 seconds..