[ 56.412064][ T26] audit: type=1800 audit(1573018581.507:27): pid=7813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 56.449809][ T26] audit: type=1800 audit(1573018581.507:28): pid=7813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.368132][ T26] audit: type=1800 audit(1573018582.527:29): pid=7813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 57.388168][ T26] audit: type=1800 audit(1573018582.527:30): pid=7813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.237' (ECDSA) to the list of known hosts. 2019/11/06 05:36:32 fuzzer started 2019/11/06 05:36:34 dialing manager at 10.128.0.105:39303 2019/11/06 05:36:42 syscalls: 2553 2019/11/06 05:36:42 code coverage: enabled 2019/11/06 05:36:42 comparison tracing: enabled 2019/11/06 05:36:42 extra coverage: extra coverage is not supported by the kernel 2019/11/06 05:36:42 setuid sandbox: enabled 2019/11/06 05:36:42 namespace sandbox: enabled 2019/11/06 05:36:42 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 05:36:42 fault injection: enabled 2019/11/06 05:36:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 05:36:42 net packet injection: enabled 2019/11/06 05:36:42 net device setup: enabled 2019/11/06 05:36:42 concurrency sanitizer: enabled 2019/11/06 05:36:42 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 85.061831][ T7978] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/06 05:36:51 adding functions to KCSAN blacklist: 'tick_sched_do_timer' 'blk_mq_sched_dispatch_requests' 'inet_putpeer' 'xas_find_marked' '__dev_queue_xmit' '__hrtimer_run_queues' 'do_nanosleep' 'ktime_get_with_offset' 'ext4_mb_good_group' 'generic_write_end' 'page_counter_try_charge' '__snd_rawmidi_transmit_ack' 'kvm_mmu_notifier_invalidate_range_end' 'ext4_mark_iloc_dirty' 'wbt_done' 'find_next_bit' 'ktime_get_seconds' '__perf_event_overflow' '__delete_from_page_cache' 'vm_area_dup' 'generic_fillattr' 'get_wchan' 'run_timer_softirq' 'ext4_has_free_clusters' 'audit_log_start' 'ext4_nonda_switch' 'blk_mq_get_request' 'tick_nohz_idle_stop_tick' 'pipe_poll' 'tick_do_update_jiffies64' 'xas_clear_mark' 'process_srcu' 'ktime_get_real_seconds' 'tomoyo_supervisor' '__splice_from_pipe' 'ext4_free_inodes_count' 'sit_tunnel_xmit' '__alloc_file' 'pid_update_inode' 'fanotify_handle_event' 'tick_nohz_next_event' 'kauditd_thread' 'blk_mq_dispatch_rq_list' 'lruvec_lru_size' 'generic_permission' 'rcu_gp_fqs_check_wake' 'p9_poll_workfn' 'add_timer' 'ext4_free_inode' 'taskstats_exit' 'poll_schedule_timeout' 'do_syslog' 'tcp_add_backlog' 'find_get_pages_range_tag' 'do_exit' 'task_dump_owner' 'ep_poll' 'wbt_issue' 'pcpu_alloc' 'dd_has_work' 'atime_needs_update' 'mod_timer' '__ext4_new_inode' 05:38:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x9, 0x4000000000000800, 0x1}, 0x2c) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r2) bpf$BPF_GET_MAP_INFO(0x16, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) 05:38:56 executing program 1: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendmmsg(r0, &(0x7f0000006c40)=[{{&(0x7f00000000c0)=@nl, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x100180d4) [ 211.532927][ T7982] IPVS: ftp: loaded support on port[0] = 21 [ 211.678031][ T7982] chnl_net:caif_netlink_parms(): no params data found [ 211.739954][ T7982] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.747120][ T7982] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.755034][ T7982] device bridge_slave_0 entered promiscuous mode [ 211.762975][ T7982] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.770529][ T7982] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.778860][ T7982] device bridge_slave_1 entered promiscuous mode 05:38:57 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {0x0, 0x1, 0x0, 0x8f60}, 0x3f, [0x1, 0x3, 0x0, 0x5a, 0x3, 0x0, 0x1, 0x3, 0x2, 0x8, 0x0, 0x3ff, 0x0, 0x0, 0x3, 0x9, 0x2, 0x2, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x20, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x7, 0x0, 0x401, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xae8, 0x5, 0x0, 0x0, 0xfffffffffffffff7, 0x9, 0x0, 0x0, 0x1000, 0x200000, 0x0, 0x5, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0xffffffffffff0001], [0x3, 0xfffffffffffffff9, 0x2, 0x0, 0x7, 0x8000, 0x1000, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8ffe, 0x1, 0x0, 0xe27, 0x0, 0x0, 0x100, 0x1, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x6, 0x0, 0x7fff, 0xfffffffffffffffb, 0x0, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x43, 0x0, 0x9, 0x0, 0x8000, 0x1, 0x0, 0x1, 0x3ae9, 0x0, 0x0, 0x4, 0x9, 0x2, 0x7, 0x8000, 0x0, 0x8, 0xab0], [0x4, 0x0, 0xfff, 0x4, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc5, 0x7f, 0x0, 0x0, 0xfffffffffffffff9, 0x6, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x7fff, 0x0, 0xffff, 0x8, 0x4, 0xd, 0x80000000, 0x6, 0x20, 0x0, 0x0, 0x3, 0x0, 0x2, 0x3, 0x80000001, 0x6, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x9, 0x800, 0x2, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xffff, 0x3ff, 0x401, 0xe16, 0x0, 0x0, 0x2, 0x1, 0x8, 0x0, 0x0, 0x0, 0x9, 0x5, 0x1c8, 0x40, 0x22, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffff000, 0x1, 0x20, 0x10000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x2, 0x2, 0x9, 0x8, 0x0, 0x0, 0x0, 0x80, 0x7fffffff, 0x0, 0x0, 0x2, 0x100]}, 0x45c) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) [ 211.797436][ T7982] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.808041][ T7982] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.823098][ T7985] IPVS: ftp: loaded support on port[0] = 21 [ 211.830150][ T7982] team0: Port device team_slave_0 added [ 211.837981][ T7982] team0: Port device team_slave_1 added [ 211.927941][ T7982] device hsr_slave_0 entered promiscuous mode [ 212.005719][ T7982] device hsr_slave_1 entered promiscuous mode 05:38:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003300050ad25a80648c6394fb0300fc0010000b400c000100053582c137153e37040008805b31a83e3f02", 0x2e}], 0x1}, 0x0) [ 212.091162][ T7987] IPVS: ftp: loaded support on port[0] = 21 [ 212.214895][ T7982] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.222019][ T7982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.229425][ T7982] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.236508][ T7982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.467116][ T7985] chnl_net:caif_netlink_parms(): no params data found [ 212.611925][ T8014] IPVS: ftp: loaded support on port[0] = 21 [ 212.623285][ T7985] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.665403][ T7985] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.696520][ T7985] device bridge_slave_0 entered promiscuous mode [ 212.716525][ T2843] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.755523][ T2843] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.786262][ T7985] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.793335][ T7985] bridge0: port 2(bridge_slave_1) entered disabled state 05:38:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0xff05) [ 212.837755][ T7985] device bridge_slave_1 entered promiscuous mode [ 212.868660][ T7982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.896229][ T7987] chnl_net:caif_netlink_parms(): no params data found [ 212.964715][ T7982] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.001895][ T7985] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.045654][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.058126][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.110977][ T7985] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.187797][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.216561][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.245953][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.253059][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.298598][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.337615][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.366045][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.373115][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.418095][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.457527][ T7985] team0: Port device team_slave_0 added [ 213.487824][ T8018] IPVS: ftp: loaded support on port[0] = 21 [ 213.522774][ T7985] team0: Port device team_slave_1 added [ 213.588730][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.622437][ T7987] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.630503][ T7987] bridge0: port 1(bridge_slave_0) entered disabled state 05:38:58 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000f60000)=0xcb72, 0x4) connect$inet(r0, &(0x7f0000001ff0), 0x10) [ 213.666583][ T7987] device bridge_slave_0 entered promiscuous mode [ 213.737886][ T7985] device hsr_slave_0 entered promiscuous mode [ 213.775629][ T7985] device hsr_slave_1 entered promiscuous mode [ 213.815367][ T7985] debugfs: Directory 'hsr0' with parent '/' already present! [ 213.822982][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.846065][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.876355][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.916279][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.942415][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.981013][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.000393][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.011808][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.037614][ T7982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.051021][ T7987] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.058299][ T7987] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.066426][ T7987] device bridge_slave_1 entered promiscuous mode [ 214.080108][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.085078][ T8023] IPVS: ftp: loaded support on port[0] = 21 [ 214.142266][ T7987] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.152944][ T7987] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.166653][ T8014] chnl_net:caif_netlink_parms(): no params data found [ 214.226440][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 214.233948][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.268219][ T7987] team0: Port device team_slave_0 added [ 214.331408][ T7987] team0: Port device team_slave_1 added [ 214.339550][ T7982] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.354324][ T8014] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.362929][ T8014] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.388701][ T8014] device bridge_slave_0 entered promiscuous mode [ 214.467225][ T7985] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.474381][ T8014] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.498146][ T8014] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.507024][ T8014] device bridge_slave_1 entered promiscuous mode [ 214.588182][ T7987] device hsr_slave_0 entered promiscuous mode [ 214.645731][ T7987] device hsr_slave_1 entered promiscuous mode [ 214.665466][ T7987] debugfs: Directory 'hsr0' with parent '/' already present! [ 214.749659][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.770394][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.836886][ T7985] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.876924][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.909135][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.968620][ T2843] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.975787][ T2843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.027340][ T8014] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.075630][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.088940][ T8014] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.144001][ T8018] chnl_net:caif_netlink_parms(): no params data found [ 215.198939][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.234632][ T8077] ================================================================== [ 215.235594][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.242913][ T8077] BUG: KCSAN: data-race in alloc_empty_file / percpu_counter_add_batch [ 215.259107][ T8077] [ 215.261450][ T8077] read to 0xffffffff85a08548 of 8 bytes by task 7949 on cpu 0: [ 215.269015][ T8077] alloc_empty_file+0x2d/0x180 [ 215.273824][ T8077] path_openat+0x74/0x36e0 [ 215.278255][ T8077] do_filp_open+0x11e/0x1b0 [ 215.282772][ T8077] do_sys_open+0x3b3/0x4f0 [ 215.287192][ T8077] __x64_sys_open+0x55/0x70 [ 215.291717][ T8077] do_syscall_64+0xcc/0x370 [ 215.296235][ T8077] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 215.300185][ T2843] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.302124][ T8077] [ 215.302147][ T8077] write to 0xffffffff85a08548 of 8 bytes by task 8077 on cpu 1: [ 215.302181][ T8077] percpu_counter_add_batch+0xca/0x150 [ 215.309247][ T2843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.311516][ T8077] alloc_empty_file+0xd2/0x180 [ 215.311622][ T8077] path_openat+0x74/0x36e0 [ 215.341151][ T8077] do_filp_open+0x11e/0x1b0 [ 215.345673][ T8077] do_open_execat+0x111/0x3d0 [ 215.350369][ T8077] open_exec+0x50/0x80 [ 215.354461][ T8077] load_elf_binary+0x4d4/0x2ec0 [ 215.359327][ T8077] search_binary_handler+0x127/0x420 [ 215.364629][ T8077] __do_execve_file.isra.0+0xb76/0x11d0 [ 215.370196][ T8077] __x64_sys_execve+0x62/0x80 [ 215.374893][ T8077] do_syscall_64+0xcc/0x370 [ 215.379767][ T8077] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 215.385661][ T8077] [ 215.387998][ T8077] Reported by Kernel Concurrency Sanitizer on: [ 215.389005][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.394183][ T8077] CPU: 1 PID: 8077 Comm: net.agent Not tainted 5.4.0-rc6+ #0 [ 215.394194][ T8077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.394218][ T8077] ================================================================== [ 215.428146][ T8077] Kernel panic - not syncing: panic_on_warn set ... [ 215.434757][ T8077] CPU: 1 PID: 8077 Comm: net.agent Not tainted 5.4.0-rc6+ #0 [ 215.442148][ T8077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.447457][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.452211][ T8077] Call Trace: [ 215.452245][ T8077] dump_stack+0xf5/0x159 [ 215.452274][ T8077] panic+0x210/0x640 [ 215.471608][ T8077] ? vprintk_func+0x8d/0x140 [ 215.476226][ T8077] kcsan_report.cold+0xc/0xe [ 215.480846][ T8077] kcsan_setup_watchpoint+0x3fe/0x410 [ 215.486254][ T8077] __tsan_unaligned_write8+0x143/0x1f0 [ 215.491770][ T8077] percpu_counter_add_batch+0xca/0x150 [ 215.497265][ T8077] alloc_empty_file+0xd2/0x180 [ 215.502063][ T8077] path_openat+0x74/0x36e0 [ 215.506508][ T8077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.507922][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.512791][ T8077] ? generic_file_read_iter+0xb95/0x1440 [ 215.512896][ T8077] do_filp_open+0x11e/0x1b0 [ 215.530930][ T8077] ? new_sync_read+0x3cf/0x4f0 [ 215.535730][ T8077] ? __read_once_size.constprop.0+0x12/0x20 [ 215.541654][ T8077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.547910][ T8077] ? should_fail+0xd4/0x45d [ 215.552440][ T8077] ? memcg_kmem_put_cache+0x91/0xe0 [ 215.557669][ T8077] do_open_execat+0x111/0x3d0 [ 215.561728][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.562371][ T8077] open_exec+0x50/0x80 [ 215.562404][ T8077] load_elf_binary+0x4d4/0x2ec0 [ 215.579126][ T8077] ? __read_once_size.constprop.0+0x12/0x20 [ 215.585047][ T8077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.591340][ T8077] ? refcount_sub_and_test_checked+0xc8/0x190 [ 215.597435][ T8077] ? refcount_dec_and_test_checked+0x2c/0x40 [ 215.603428][ T8077] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 215.603457][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.609690][ T8077] ? _raw_read_unlock+0x34/0x50 [ 215.609763][ T8077] search_binary_handler+0x127/0x420 [ 215.627807][ T8077] __do_execve_file.isra.0+0xb76/0x11d0 [ 215.633388][ T8077] __x64_sys_execve+0x62/0x80 [ 215.638097][ T8077] do_syscall_64+0xcc/0x370 [ 215.642628][ T8077] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 215.648536][ T8077] RIP: 0033:0x7eff5756c207 [ 215.652978][ T8077] Code: 77 19 f4 48 89 d7 44 89 c0 0f 05 48 3d 00 f0 ff ff 76 e0 f7 d8 64 41 89 01 eb d8 f7 d8 64 41 89 01 eb df b8 3b 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 f3 c3 48 8b 15 00 8c 2d 00 f7 d8 64 89 02 [ 215.662961][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.672595][ T8077] RSP: 002b:00007fffe8ea0ab8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b [ 215.672616][ T8077] RAX: ffffffffffffffda RBX: 0000000001bf0600 RCX: 00007eff5756c207 [ 215.672628][ T8077] RDX: 0000000001bf0630 RSI: 0000000001bf0600 RDI: 0000000001bf0690 [ 215.672640][ T8077] RBP: 0000000001bf0690 R08: 000000000061c428 R09: 00007eff575e3800 [ 215.672664][ T8077] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000001bf0630 [ 215.720910][ T8077] R13: 0000000001bf0630 R14: 0000000000000000 R15: 0000000000000000 [ 215.730354][ T8077] Kernel Offset: disabled [ 215.734730][ T8077] Rebooting in 86400 seconds..