[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 39.796247][ T26] audit: type=1800 audit(1572816363.435:25): pid=6958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 39.823978][ T26] audit: type=1800 audit(1572816363.435:26): pid=6958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 39.851275][ T26] audit: type=1800 audit(1572816363.445:27): pid=6958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.56' (ECDSA) to the list of known hosts. 2019/11/03 21:26:14 fuzzer started 2019/11/03 21:26:14 dialing manager at 10.128.0.105:42255 2019/11/03 21:26:17 syscalls: 2553 2019/11/03 21:26:17 code coverage: enabled 2019/11/03 21:26:17 comparison tracing: enabled 2019/11/03 21:26:17 extra coverage: extra coverage is not supported by the kernel 2019/11/03 21:26:17 setuid sandbox: enabled 2019/11/03 21:26:17 namespace sandbox: enabled 2019/11/03 21:26:17 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 21:26:17 fault injection: enabled 2019/11/03 21:26:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 21:26:17 net packet injection: enabled 2019/11/03 21:26:17 net device setup: enabled 2019/11/03 21:26:17 concurrency sanitizer: enabled 2019/11/03 21:26:17 devlink PCI setup: PCI device 0000:00:10.0 is not available 21:26:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bond0\x00\x02H\xfeL `\x00\nz\x03', 0xffb}) lseek(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 21:26:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) accept4$tipc(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10, 0x800) geteuid() r1 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000d00)) getuid() getresgid(&(0x7f0000000000), &(0x7f0000000200), &(0x7f0000001680)) fstat(r0, 0x0) gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed99", 0x42}], 0x1, &(0x7f00000010c0), 0x0, 0x40044}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44081}, {&(0x7f0000001a80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, 0x0}], 0x4, 0x20000000) getgroups(0x3, &(0x7f00000000c0)=[0x0, 0xffffffffffffffff, 0x0]) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x125) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000140)={0x9c, 0x1000, 0x4, 0x39, 0x1f, 0x96}) ftruncate(r4, 0x200004) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r2, r4, 0x0, 0x80001d00c0d0) syzkaller login: [ 54.882478][ T7131] IPVS: ftp: loaded support on port[0] = 21 [ 55.009588][ T7131] chnl_net:caif_netlink_parms(): no params data found [ 55.091465][ T7131] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.098667][ T7131] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.107191][ T7131] device bridge_slave_0 entered promiscuous mode [ 55.115795][ T7131] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.123760][ T7131] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.132104][ T7131] device bridge_slave_1 entered promiscuous mode [ 55.152117][ T7134] IPVS: ftp: loaded support on port[0] = 21 [ 55.155131][ T7131] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.182468][ T7131] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.227868][ T7131] team0: Port device team_slave_0 added [ 55.245660][ T7131] team0: Port device team_slave_1 added 21:26:18 executing program 2: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x400000000}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f00000000c0)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x964c, 0x400}], 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 55.353210][ T7131] device hsr_slave_0 entered promiscuous mode [ 55.401131][ T7131] device hsr_slave_1 entered promiscuous mode [ 55.459475][ T7137] IPVS: ftp: loaded support on port[0] = 21 [ 55.482626][ T7134] chnl_net:caif_netlink_parms(): no params data found [ 55.588395][ T7131] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.595545][ T7131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.603006][ T7131] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.610113][ T7131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.729086][ T7134] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.755972][ T7134] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.792543][ T7134] device bridge_slave_0 entered promiscuous mode [ 55.836492][ T7134] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.862054][ T7134] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.881776][ T7134] device bridge_slave_1 entered promiscuous mode 21:26:19 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x5, 0x0, 0x0, {0x77359400}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "cf4e4f4983eb925b"}}, 0x48}}, 0x0) [ 55.987287][ T7131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.042179][ T7134] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.095915][ T7134] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.149107][ T2405] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.190377][ T2405] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.230829][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 56.298872][ T7137] chnl_net:caif_netlink_parms(): no params data found [ 56.355553][ T7131] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.401632][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.422242][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.456585][ T7134] team0: Port device team_slave_0 added [ 56.481374][ T7134] team0: Port device team_slave_1 added [ 56.560631][ T7159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.580642][ T7159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.610905][ T7159] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.618181][ T7159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.691451][ T7166] IPVS: ftp: loaded support on port[0] = 21 [ 56.691728][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.733859][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.770582][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.777683][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.830794][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.851262][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.881617][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.920870][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 21:26:20 executing program 4: clock_gettime(0x1, &(0x7f0000000040)) [ 56.968752][ T7131] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 57.010074][ T7131] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 57.094190][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.113745][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.161015][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.201191][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.253326][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.281458][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 57.313071][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.341185][ T7137] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.348258][ T7137] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.391029][ T7137] device bridge_slave_0 entered promiscuous mode [ 57.430789][ T7137] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.437925][ T7137] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.480120][ T7137] device bridge_slave_1 entered promiscuous mode [ 57.553230][ T7134] device hsr_slave_0 entered promiscuous mode [ 57.583544][ T7134] device hsr_slave_1 entered promiscuous mode [ 57.622351][ T7134] debugfs: Directory 'hsr0' with parent '/' already present! [ 57.630094][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.646347][ T7169] IPVS: ftp: loaded support on port[0] = 21 [ 57.670612][ T7131] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.722270][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 57.729912][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 57.782389][ T7137] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.855426][ T7137] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.976835][ T7137] team0: Port device team_slave_0 added [ 58.073715][ T7137] team0: Port device team_slave_1 added 21:26:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)="2e000000270005001900e0713c444d24010000000c0009000000000040d1bd3f2437e606686e9b110e7f9e05b9c3", 0x2e}], 0x1}, 0x0) [ 58.273166][ T7137] device hsr_slave_0 entered promiscuous mode [ 58.330480][ T7137] device hsr_slave_1 entered promiscuous mode [ 58.350109][ T7137] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.366591][ T7166] chnl_net:caif_netlink_parms(): no params data found [ 58.570969][ T7207] device bond0 entered promiscuous mode [ 58.610167][ T7207] device bond_slave_0 entered promiscuous mode [ 58.630229][ T7207] device bond_slave_1 entered promiscuous mode [ 58.660476][ T7207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.822469][ T7210] IPVS: ftp: loaded support on port[0] = 21 [ 58.835302][ T7134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.948805][ T7206] device bond0 left promiscuous mode [ 58.957786][ T7206] device bond_slave_0 left promiscuous mode [ 58.974186][ T7206] device bond_slave_1 left promiscuous mode [ 59.223700][ T7207] device bond0 entered promiscuous mode [ 59.229304][ T7207] device bond_slave_0 entered promiscuous mode [ 59.290612][ T7207] device bond_slave_1 entered promiscuous mode [ 59.298091][ T7207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.378747][ T7134] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.431643][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.439639][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.560516][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.569716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 21:26:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bond0\x00\x02H\xfeL `\x00\nz\x03', 0xffb}) lseek(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 59.640482][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.647626][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.754336][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.814977][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.847119][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.854270][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.919723][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.967664][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.018751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.069406][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.160413][ T7166] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.167953][ T7166] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.214135][ T7166] device bridge_slave_0 entered promiscuous mode [ 60.258146][ T7234] device bond0 left promiscuous mode [ 60.263982][ T7234] device bond_slave_0 left promiscuous mode [ 60.300314][ T7234] device bond_slave_1 left promiscuous mode [ 60.560682][ T7235] device bond0 entered promiscuous mode [ 60.583044][ T7235] device bond_slave_0 entered promiscuous mode [ 60.624119][ T7235] device bond_slave_1 entered promiscuous mode [ 60.680655][ T7235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.756929][ T7169] chnl_net:caif_netlink_parms(): no params data found [ 60.793544][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.823783][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.861407][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.945366][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.997853][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.069371][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.126804][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.164029][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.175545][ T7134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.193622][ T7166] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.204242][ T7166] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.212915][ T7166] device bridge_slave_1 entered promiscuous mode 21:26:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bond0\x00\x02H\xfeL `\x00\nz\x03', 0xffb}) lseek(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 61.246650][ T7137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.277346][ T7134] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.309818][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.318621][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.340379][ T7248] device bond0 left promiscuous mode [ 61.345838][ T7248] device bond_slave_0 left promiscuous mode [ 61.360359][ T7248] device bond_slave_1 left promiscuous mode [ 61.519409][ T7166] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.581139][ T7250] device bond0 entered promiscuous mode [ 61.586979][ T7250] device bond_slave_0 entered promiscuous mode [ 61.607215][ T7250] device bond_slave_1 entered promiscuous mode [ 61.631760][ T7250] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.652520][ T7137] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.664399][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.681207][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.701275][ T7166] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.749962][ T7169] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.789506][ T7169] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.809733][ T7169] device bridge_slave_0 entered promiscuous mode [ 61.881347][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.901631][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.943100][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.951388][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.003969][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.029113][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.039150][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.046337][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state 21:26:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bond0\x00\x02H\xfeL `\x00\nz\x03', 0xffb}) lseek(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 62.060964][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.074868][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.086277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.116541][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.127403][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.143023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.155418][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.164128][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.174280][ T7169] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.182319][ T7169] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.191550][ T7169] device bridge_slave_1 entered promiscuous mode [ 62.214634][ T7166] team0: Port device team_slave_0 added [ 62.222158][ T7266] device bond0 left promiscuous mode [ 62.240650][ T7266] device bond_slave_0 left promiscuous mode [ 62.256242][ T7266] device bond_slave_1 left promiscuous mode [ 62.280268][ C0] hrtimer: interrupt took 43773 ns [ 62.322125][ T7267] device bond0 entered promiscuous mode [ 62.327918][ T7267] device bond_slave_0 entered promiscuous mode [ 62.353183][ T7267] device bond_slave_1 entered promiscuous mode [ 62.373803][ T7267] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.396192][ T7166] team0: Port device team_slave_1 added [ 62.417867][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.426739][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.439073][ T7169] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.458588][ T7169] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.512859][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.527408][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.536305][ T26] kauditd_printk_skb: 3 callbacks suppressed 21:26:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bond0\x00\x02H\xfeL `\x00\nz\x03', 0xffb}) lseek(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 62.536333][ T26] audit: type=1800 audit(1572816386.175:31): pid=7274 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16525 res=0 [ 62.551396][ T7137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.625666][ T7169] team0: Port device team_slave_0 added [ 62.659447][ T7137] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.668362][ T7279] device bond0 left promiscuous mode 21:26:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) accept4$tipc(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10, 0x800) geteuid() r1 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000d00)) getuid() getresgid(&(0x7f0000000000), &(0x7f0000000200), &(0x7f0000001680)) fstat(r0, 0x0) gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed99", 0x42}], 0x1, &(0x7f00000010c0), 0x0, 0x40044}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44081}, {&(0x7f0000001a80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, 0x0}], 0x4, 0x20000000) getgroups(0x3, &(0x7f00000000c0)=[0x0, 0xffffffffffffffff, 0x0]) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x125) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000140)={0x9c, 0x1000, 0x4, 0x39, 0x1f, 0x96}) ftruncate(r4, 0x200004) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r2, r4, 0x0, 0x80001d00c0d0) [ 62.676948][ T7279] device bond_slave_0 left promiscuous mode [ 62.684875][ T7279] device bond_slave_1 left promiscuous mode [ 62.839128][ T7169] team0: Port device team_slave_1 added 21:26:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) accept4$tipc(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10, 0x800) geteuid() r1 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000d00)) getuid() getresgid(&(0x7f0000000000), &(0x7f0000000200), &(0x7f0000001680)) fstat(r0, 0x0) gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed99", 0x42}], 0x1, &(0x7f00000010c0), 0x0, 0x40044}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44081}, {&(0x7f0000001a80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, 0x0}], 0x4, 0x20000000) getgroups(0x3, &(0x7f00000000c0)=[0x0, 0xffffffffffffffff, 0x0]) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x125) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000140)={0x9c, 0x1000, 0x4, 0x39, 0x1f, 0x96}) ftruncate(r4, 0x200004) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r2, r4, 0x0, 0x80001d00c0d0) [ 62.907141][ T7166] device hsr_slave_0 entered promiscuous mode [ 62.950479][ T7166] device hsr_slave_1 entered promiscuous mode [ 62.990064][ T7166] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.016665][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.030951][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.038813][ T7280] device bond0 entered promiscuous mode [ 63.048625][ T7280] device bond_slave_0 entered promiscuous mode [ 63.055242][ T7280] device bond_slave_1 entered promiscuous mode [ 63.067460][ T7280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.084783][ T7210] chnl_net:caif_netlink_parms(): no params data found [ 63.253052][ T7169] device hsr_slave_0 entered promiscuous mode 21:26:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bond0\x00\x02H\xfeL `\x00\nz\x03', 0xffb}) lseek(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 63.300392][ T7169] device hsr_slave_1 entered promiscuous mode [ 63.350299][ T7169] debugfs: Directory 'hsr0' with parent '/' already present! 21:26:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) accept4$tipc(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10, 0x800) geteuid() r1 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000d00)) getuid() getresgid(&(0x7f0000000000), &(0x7f0000000200), &(0x7f0000001680)) fstat(r0, 0x0) gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed99", 0x42}], 0x1, &(0x7f00000010c0), 0x0, 0x40044}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44081}, {&(0x7f0000001a80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, 0x0}], 0x4, 0x20000000) getgroups(0x3, &(0x7f00000000c0)=[0x0, 0xffffffffffffffff, 0x0]) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x125) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000140)={0x9c, 0x1000, 0x4, 0x39, 0x1f, 0x96}) ftruncate(r4, 0x200004) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r2, r4, 0x0, 0x80001d00c0d0) [ 63.658445][ T7210] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.682067][ T7210] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.730711][ T7210] device bridge_slave_0 entered promiscuous mode [ 63.821577][ T7316] device bond0 left promiscuous mode [ 63.827202][ T7316] device bond_slave_0 left promiscuous mode [ 63.881933][ T7316] device bond_slave_1 left promiscuous mode [ 64.190618][ T7330] EXT4-fs (loop2): unsupported inode size: 0 [ 64.197090][ T7321] device bond0 entered promiscuous mode [ 64.312300][ T7321] device bond_slave_0 entered promiscuous mode [ 64.481409][ T7321] device bond_slave_1 entered promiscuous mode [ 64.543011][ T7321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.637926][ T7210] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.653148][ T7210] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.726789][ T7210] device bridge_slave_1 entered promiscuous mode [ 64.854011][ T7166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.968179][ T7210] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 21:26:28 executing program 2: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x400000000}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f00000000c0)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x964c, 0x400}], 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 65.068164][ T7166] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.113819][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.152816][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.212632][ T7210] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.269350][ T7169] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.378316][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.405151][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.462534][ T2405] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.469676][ T2405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.543768][ T7357] EXT4-fs (loop2): unsupported inode size: 0 [ 65.565188][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.624920][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.668788][ T2405] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.677202][ T2405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.755044][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.806353][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.869139][ T7166] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 66.000048][ T7166] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.052460][ T7210] team0: Port device team_slave_0 added [ 66.085272][ T7210] team0: Port device team_slave_1 added [ 66.132722][ T7169] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.170556][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.181179][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.250882][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.300788][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.309908][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.391168][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.399822][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.486199][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.525378][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.580803][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.588953][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.729729][ T7166] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.780708][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.789316][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.855086][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.900774][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.909298][ T7164] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.916910][ T7164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.015188][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.075050][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.101278][ T7164] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.108430][ T7164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.197176][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.259155][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.305531][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.365698][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.405405][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 67.430244][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 67.493162][ T7210] device hsr_slave_0 entered promiscuous mode [ 67.587365][ T7210] device hsr_slave_1 entered promiscuous mode [ 67.640205][ T7210] debugfs: Directory 'hsr0' with parent '/' already present! [ 67.665652][ T7169] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 67.689356][ T7169] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.725671][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.735133][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.748310][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.757767][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.776777][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.785765][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.794900][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.803417][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.812162][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.830090][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 67.838065][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 67.879359][ T7169] 8021q: adding VLAN 0 to HW filter on device batadv0 21:26:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bond0\x00\x02H\xfeL `\x00\nz\x03', 0xffb}) lseek(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 68.170572][ T7210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.297703][ T7210] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.343168][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.360999][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.380780][ T7413] device bond0 left promiscuous mode [ 68.397588][ T7413] device bond_slave_0 left promiscuous mode [ 68.429864][ T7413] device bond_slave_1 left promiscuous mode 21:26:32 executing program 4: clock_gettime(0x1, &(0x7f0000000040)) [ 68.640293][ T7416] device bond0 entered promiscuous mode [ 68.646031][ T7416] device bond_slave_0 entered promiscuous mode [ 68.680851][ T7416] device bond_slave_1 entered promiscuous mode [ 68.708794][ T7416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.760117][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.768971][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.812388][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.819534][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.925308][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.942410][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.982072][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.022066][ T7167] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.029237][ T7167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.090823][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.174052][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.219823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.241039][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.260708][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.269597][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.319217][ T7210] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 69.360114][ T7210] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 69.402281][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.411602][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.420728][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.429748][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.480898][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.523091][ T7210] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.542869][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 69.553935][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 69.586707][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 69.624235][ T7400] ================================================================== [ 69.632413][ T7400] BUG: KCSAN: data-race in generic_permission / task_dump_owner [ 69.640082][ T7400] [ 69.642422][ T7400] write to 0xffff888125b6e7fc of 4 bytes by task 7403 on cpu 0: [ 69.650053][ T7400] task_dump_owner+0xd8/0x260 [ 69.654744][ T7400] pid_update_inode+0x3c/0x70 [ 69.659419][ T7400] pid_revalidate+0x91/0xd0 [ 69.663920][ T7400] lookup_fast+0x6f2/0x700 [ 69.668439][ T7400] walk_component+0x6d/0xe80 [ 69.673029][ T7400] link_path_walk.part.0+0x5d3/0xa90 [ 69.678398][ T7400] path_openat+0x14f/0x36e0 [ 69.682923][ T7400] do_filp_open+0x11e/0x1b0 [ 69.687508][ T7400] do_sys_open+0x3b3/0x4f0 [ 69.691922][ T7400] __x64_sys_open+0x55/0x70 [ 69.697910][ T7400] do_syscall_64+0xcc/0x370 [ 69.702434][ T7400] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 69.708329][ T7400] [ 69.710661][ T7400] read to 0xffff888125b6e7fc of 4 bytes by task 7400 on cpu 1: [ 69.718205][ T7400] generic_permission+0x65/0x3d0 [ 69.723139][ T7400] proc_pid_permission+0xea/0x1c0 [ 69.728160][ T7400] inode_permission+0x241/0x3c0 [ 69.733358][ T7400] link_path_walk.part.0+0x622/0xa90 [ 69.742465][ T7400] path_openat+0x14f/0x36e0 [ 69.747590][ T7400] do_filp_open+0x11e/0x1b0 [ 69.752085][ T7400] do_sys_open+0x3b3/0x4f0 [ 69.757105][ T7400] __x64_sys_open+0x55/0x70 [ 69.761610][ T7400] do_syscall_64+0xcc/0x370 [ 69.766103][ T7400] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 69.771991][ T7400] [ 69.774306][ T7400] Reported by Kernel Concurrency Sanitizer on: [ 69.780452][ T7400] CPU: 1 PID: 7400 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 69.787544][ T7400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.798112][ T7400] ================================================================== [ 69.806184][ T7400] Kernel panic - not syncing: panic_on_warn set ... [ 69.812765][ T7400] CPU: 1 PID: 7400 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 69.819534][ T7400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.829580][ T7400] Call Trace: [ 69.833396][ T7400] dump_stack+0xf5/0x159 [ 69.837651][ T7400] panic+0x210/0x640 [ 69.841556][ T7400] ? do_syscall_64+0xcc/0x370 [ 69.846242][ T7400] ? vprintk_func+0x8d/0x140 [ 69.850831][ T7400] kcsan_report.cold+0xc/0x10 [ 69.855506][ T7400] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 69.861052][ T7400] __tsan_read4+0x2c/0x30 [ 69.865384][ T7400] generic_permission+0x65/0x3d0 [ 69.870317][ T7400] proc_pid_permission+0xea/0x1c0 [ 69.876032][ T7400] ? comm_show+0xb0/0xb0 [ 69.880294][ T7400] inode_permission+0x241/0x3c0 [ 69.885149][ T7400] link_path_walk.part.0+0x622/0xa90 [ 69.890439][ T7400] path_openat+0x14f/0x36e0 [ 69.895114][ T7400] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 69.900746][ T7400] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 69.906374][ T7400] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 69.912023][ T7400] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 69.917649][ T7400] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 69.923282][ T7400] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 69.928925][ T7400] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 69.934550][ T7400] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 69.940201][ T7400] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 69.946111][ T7400] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 69.951748][ T7400] do_filp_open+0x11e/0x1b0 [ 69.956263][ T7400] ? __alloc_fd+0x316/0x4c0 [ 69.960770][ T7400] do_sys_open+0x3b3/0x4f0 [ 69.965218][ T7400] __x64_sys_open+0x55/0x70 [ 69.969752][ T7400] do_syscall_64+0xcc/0x370 [ 69.974280][ T7400] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 69.980168][ T7400] RIP: 0033:0x7f4f6d9c5120 [ 69.984580][ T7400] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 70.004710][ T7400] RSP: 002b:00007fff48d671e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 70.013134][ T7400] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f4f6d9c5120 [ 70.021107][ T7400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f4f6de93d00 [ 70.029075][ T7400] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f4f6dc8d57b [ 70.037042][ T7400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f6de92d00 [ 70.045008][ T7400] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 70.054448][ T7400] Kernel Offset: disabled [ 70.058770][ T7400] Rebooting in 86400 seconds..