[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 42.785546][ T26] audit: type=1800 audit(1572816368.090:25): pid=7056 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 42.821680][ T26] audit: type=1800 audit(1572816368.090:26): pid=7056 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 42.845927][ T26] audit: type=1800 audit(1572816368.090:27): pid=7056 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.49' (ECDSA) to the list of known hosts. 2019/11/03 21:26:20 fuzzer started 2019/11/03 21:26:21 dialing manager at 10.128.0.105:42255 2019/11/03 21:26:21 syscalls: 2553 2019/11/03 21:26:21 code coverage: enabled 2019/11/03 21:26:21 comparison tracing: enabled 2019/11/03 21:26:21 extra coverage: extra coverage is not supported by the kernel 2019/11/03 21:26:21 setuid sandbox: enabled 2019/11/03 21:26:21 namespace sandbox: enabled 2019/11/03 21:26:21 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 21:26:21 fault injection: enabled 2019/11/03 21:26:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 21:26:21 net packet injection: enabled 2019/11/03 21:26:21 net device setup: enabled 2019/11/03 21:26:21 concurrency sanitizer: enabled 2019/11/03 21:26:21 devlink PCI setup: PCI device 0000:00:10.0 is not available 21:26:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) 21:26:22 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="680000007d010000000a16500d9cebe5190401000000000000000001000000008080a800000041000000fdffffffffffffff0a05006465762f70746d78000a002f6465762f70746d78000d0073656375726974792e696d61000d0073656375726974792e696d6100f1ecd2cb3e862672e12387897f0af72898c1e0816875c4be0734109451f0725e5a031d330d42bef28fd54546a63d8641a8ece299b47819335ac9b64edf781236914d298913feea3170761e4247e12745662d9c886864b9"], 0x68) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(0x0, r1, 0x9, r0, 0x2) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) r2 = syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) time(0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000040)) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmsg$kcm(0xffffffffffffffff, 0x0, 0xa945557510a6b2cc) listxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000640)=""/233, 0xe9) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) fgetxattr(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="7472006d0935ee2674569f08"], 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e24, @loopback}, 0x100, 0x0, 0x0, 0x0, 0x3f, &(0x7f00000000c0)='rose0\x00', 0x7, 0xae, 0x103}) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000440)={0x0, 0x2e5, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRESDEC], 0x1}}, 0x0) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x2f2, &(0x7f0000003bc0)}}], 0x3a6, 0x0) syzkaller login: [ 57.018276][ T7224] IPVS: ftp: loaded support on port[0] = 21 [ 57.182652][ T7224] chnl_net:caif_netlink_parms(): no params data found 21:26:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000400)={'syz'}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)=ANY=[], &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0xd, &(0x7f0000000100), &(0x7f0000000080)=0x8) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='/dev/midi#\x00') sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x806}, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 57.241589][ T7224] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.248829][ T7224] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.257519][ T7224] device bridge_slave_0 entered promiscuous mode [ 57.272353][ T7227] IPVS: ftp: loaded support on port[0] = 21 [ 57.280370][ T7224] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.289391][ T7224] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.327552][ T7224] device bridge_slave_1 entered promiscuous mode [ 57.383690][ T7224] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.410387][ T7224] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.456125][ T7224] team0: Port device team_slave_0 added [ 57.484537][ T7224] team0: Port device team_slave_1 added [ 57.524950][ T7229] IPVS: ftp: loaded support on port[0] = 21 21:26:22 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x4, 0x8000) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000300)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000100)=@req3={0x8, 0x100000001, 0x10000, 0x1, 0x1ff}, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000500)="ee", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0xd, &(0x7f0000000240)={@mcast1, 0x0}, &(0x7f0000000280)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000002c0)={@loopback, r5}, 0x14) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x1c}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 57.609949][ T7224] device hsr_slave_0 entered promiscuous mode [ 57.647747][ T7224] device hsr_slave_1 entered promiscuous mode [ 57.830162][ T7227] chnl_net:caif_netlink_parms(): no params data found [ 57.907630][ T7234] IPVS: ftp: loaded support on port[0] = 21 [ 57.970408][ T7224] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.977542][ T7224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.984870][ T7224] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.992008][ T7224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.110649][ T7227] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.118215][ T7227] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.126271][ T7227] device bridge_slave_0 entered promiscuous mode [ 58.180287][ T7227] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.206694][ T7227] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.214610][ T7227] device bridge_slave_1 entered promiscuous mode [ 58.266011][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.308343][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.388908][ T7229] chnl_net:caif_netlink_parms(): no params data found [ 58.412229][ T7224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.442568][ T7227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.482316][ T7224] 8021q: adding VLAN 0 to HW filter on device team0 21:26:23 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x8, 0x0, &(0x7f0000000140)) [ 58.519513][ T7227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.543100][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.560015][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.643334][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.658142][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.717735][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.724991][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.768787][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.808953][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.838383][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.845488][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.908756][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.004829][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.031992][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.049784][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.078499][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.117787][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.157561][ T7227] team0: Port device team_slave_0 added [ 59.163382][ T7229] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.178376][ T7260] IPVS: ftp: loaded support on port[0] = 21 [ 59.189964][ T7229] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.237500][ T7229] device bridge_slave_0 entered promiscuous mode [ 59.260580][ T7227] team0: Port device team_slave_1 added [ 59.268984][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.288603][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.327299][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.360048][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.387563][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.422861][ T7229] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.436561][ T7229] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.444685][ T7229] device bridge_slave_1 entered promiscuous mode [ 59.501321][ T7224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.563549][ T7234] chnl_net:caif_netlink_parms(): no params data found [ 59.604805][ T7224] 8021q: adding VLAN 0 to HW filter on device batadv0 21:26:25 executing program 5: clone(0x10c9fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) [ 59.652088][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 59.665189][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.705955][ T7229] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.789949][ T7227] device hsr_slave_0 entered promiscuous mode [ 59.847036][ T7227] device hsr_slave_1 entered promiscuous mode [ 59.900273][ T7227] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.929674][ T7229] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.080217][ T7276] IPVS: ftp: loaded support on port[0] = 21 [ 60.096745][ T7234] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.103926][ T7234] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.122999][ T7234] device bridge_slave_0 entered promiscuous mode [ 60.155987][ T7229] team0: Port device team_slave_0 added [ 60.186598][ T7234] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.193737][ T7234] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.267455][ T7234] device bridge_slave_1 entered promiscuous mode [ 60.361893][ T7229] team0: Port device team_slave_1 added [ 60.401567][ T7234] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.454052][ T7234] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:26:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) [ 60.608023][ T7234] team0: Port device team_slave_0 added [ 60.701695][ T7229] device hsr_slave_0 entered promiscuous mode [ 60.747441][ T7229] device hsr_slave_1 entered promiscuous mode 21:26:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) [ 60.796522][ T7229] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.813139][ T7234] team0: Port device team_slave_1 added [ 60.844061][ T7260] chnl_net:caif_netlink_parms(): no params data found [ 60.920580][ T7227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.022055][ T7227] 8021q: adding VLAN 0 to HW filter on device team0 21:26:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) [ 61.081908][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.117196][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.239624][ T7234] device hsr_slave_0 entered promiscuous mode [ 61.281189][ T7234] device hsr_slave_1 entered promiscuous mode [ 61.360622][ T7234] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.425734][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.447496][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.456045][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.463255][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state 21:26:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) [ 61.579946][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.637219][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.645905][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.653042][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.817208][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.901224][ T7260] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.916726][ T7260] bridge0: port 1(bridge_slave_0) entered disabled state 21:26:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) [ 61.970513][ T7260] device bridge_slave_0 entered promiscuous mode [ 62.080625][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.104693][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.168041][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.241553][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.308147][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 21:26:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) [ 62.367227][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.427571][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.486732][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.550507][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.609470][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.674933][ T7227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.722262][ T7260] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.758154][ T7260] bridge0: port 2(bridge_slave_1) entered disabled state 21:26:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) [ 62.826173][ T7260] device bridge_slave_1 entered promiscuous mode [ 62.898633][ T7276] chnl_net:caif_netlink_parms(): no params data found [ 62.921040][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.096969][ T7229] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.121675][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.143412][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.213345][ T7227] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.286335][ T7229] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.354928][ T7260] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.397542][ T209] ================================================================== [ 63.405671][ T209] BUG: KCSAN: data-race in get_wchan / worker_thread [ 63.412338][ T209] [ 63.414658][ T209] read to 0xffff88812b3d5050 of 8 bytes by task 7349 on cpu 0: [ 63.422188][ T209] get_wchan+0x47/0x180 [ 63.426329][ T209] do_task_stat+0xdf0/0x1370 [ 63.430919][ T209] proc_tgid_stat+0x3d/0x60 [ 63.435407][ T209] proc_single_show+0x89/0xe0 [ 63.440438][ T209] seq_read+0x350/0x960 [ 63.444581][ T209] __vfs_read+0x67/0xc0 [ 63.448725][ T209] vfs_read+0x143/0x2c0 [ 63.452868][ T209] ksys_read+0xd5/0x1b0 [ 63.457020][ T209] __x64_sys_read+0x4c/0x60 [ 63.461512][ T209] do_syscall_64+0xcc/0x370 [ 63.466002][ T209] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.471913][ T209] [ 63.474273][ T209] write to 0xffff88812b3d5050 of 8 bytes by task 209 on cpu 1: [ 63.481817][ T209] worker_thread+0x1c3/0x800 [ 63.486398][ T209] kthread+0x1d4/0x200 [ 63.490454][ T209] ret_from_fork+0x1f/0x30 [ 63.494848][ T209] [ 63.497159][ T209] Reported by Kernel Concurrency Sanitizer on: [ 63.503311][ T209] CPU: 1 PID: 209 Comm: kworker/u4:3 Not tainted 5.4.0-rc3+ #0 [ 63.510835][ T209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.521022][ T209] Workqueue: 0x0 (gid-cache-wq) [ 63.525950][ T209] ================================================================== [ 63.533997][ T209] Kernel panic - not syncing: panic_on_warn set ... [ 63.540591][ T209] CPU: 1 PID: 209 Comm: kworker/u4:3 Not tainted 5.4.0-rc3+ #0 [ 63.548114][ T209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.558206][ T209] Workqueue: 0x0 (gid-cache-wq) [ 63.563127][ T209] Call Trace: [ 63.566537][ T209] dump_stack+0xf5/0x159 [ 63.570772][ T209] panic+0x210/0x640 [ 63.574676][ T209] ? vprintk_func+0x8d/0x140 [ 63.579261][ T209] kcsan_report.cold+0xc/0x10 [ 63.584158][ T209] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 63.589708][ T209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 63.595939][ T209] __tsan_write8+0x32/0x40 [ 63.600434][ T209] worker_thread+0x1c3/0x800 [ 63.605021][ T209] kthread+0x1d4/0x200 [ 63.609089][ T209] ? rescuer_thread+0x6a0/0x6a0 [ 63.613928][ T209] ? kthread_stop+0x2d0/0x2d0 [ 63.618617][ T209] ret_from_fork+0x1f/0x30 [ 64.752486][ T209] Shutting down cpus with NMI [ 64.757989][ T209] Kernel Offset: disabled [ 64.762634][ T209] Rebooting in 86400 seconds..