[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.944502][ T25] audit: type=1800 audit(1572322010.362:25): pid=7004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 38.971673][ T25] audit: type=1800 audit(1572322010.362:26): pid=7004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 39.003480][ T25] audit: type=1800 audit(1572322010.362:27): pid=7004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.24' (ECDSA) to the list of known hosts. 2019/10/29 04:07:01 fuzzer started 2019/10/29 04:07:02 dialing manager at 10.128.0.105:40771 2019/10/29 04:07:03 syscalls: 2540 2019/10/29 04:07:03 code coverage: enabled 2019/10/29 04:07:03 comparison tracing: enabled 2019/10/29 04:07:03 extra coverage: extra coverage is not supported by the kernel 2019/10/29 04:07:03 setuid sandbox: enabled 2019/10/29 04:07:03 namespace sandbox: enabled 2019/10/29 04:07:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/29 04:07:03 fault injection: enabled 2019/10/29 04:07:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/29 04:07:03 net packet injection: enabled 2019/10/29 04:07:03 net device setup: enabled 2019/10/29 04:07:03 concurrency sanitizer: enabled 04:07:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) syzkaller login: [ 53.473447][ T7174] IPVS: ftp: loaded support on port[0] = 21 04:07:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x3800) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3, 0x0) splice(r4, 0x0, r3, 0x0, 0x1000000008, 0x0) r5 = fsopen(&(0x7f0000000040)='tmpfs\x00', 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmmsg(r6, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000000100)={'veth0\x00', {0x2, 0x4e22, @rand_addr=0x1}}) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x6, 0x0, 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) fsmount(r5, 0x0, 0xb) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@loopback, @empty}, 0x8) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x492, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) syz_open_dev$radio(0x0, 0x0, 0x2) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000200)="fe51b5a58fd136472034bdd9772a7f39", 0x10) [ 53.574207][ T7174] chnl_net:caif_netlink_parms(): no params data found [ 53.654647][ T7174] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.672047][ T7174] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.682783][ T7174] device bridge_slave_0 entered promiscuous mode [ 53.702738][ T7174] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.709910][ T7174] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.719229][ T7174] device bridge_slave_1 entered promiscuous mode [ 53.753140][ T7174] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.770037][ T7174] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.788099][ T7177] IPVS: ftp: loaded support on port[0] = 21 [ 53.809176][ T7174] team0: Port device team_slave_0 added [ 53.816229][ T7174] team0: Port device team_slave_1 added 04:07:05 executing program 2: kexec_load(0x0, 0x10, &(0x7f00000005c0)=[{0x0, 0x13c000, 0x0, 0x3e0000}], 0x0) [ 53.906630][ T7174] device hsr_slave_0 entered promiscuous mode [ 53.963258][ T7174] device hsr_slave_1 entered promiscuous mode [ 54.121506][ T7179] IPVS: ftp: loaded support on port[0] = 21 [ 54.136202][ T7174] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.143314][ T7174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.150717][ T7174] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.157878][ T7174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.370482][ T7177] chnl_net:caif_netlink_parms(): no params data found [ 54.408338][ T7174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.458392][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.469169][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.513867][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.544981][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:07:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) fcntl$lock(r1, 0x24, &(0x7f0000000140)={0x2}) [ 54.580533][ T7174] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.652033][ T2610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.661031][ T2610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.723080][ T2610] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.730159][ T2610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.823472][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.834924][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.873858][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.881045][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.942870][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.983669][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.023276][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.063018][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.094663][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.123192][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.169435][ T7174] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.213420][ T7174] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.255338][ T7179] chnl_net:caif_netlink_parms(): no params data found [ 55.266117][ T7193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.283417][ T7193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.314515][ T7193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.343409][ T7193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.383047][ T7193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.414097][ T7177] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.421513][ T7177] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.454661][ T7177] device bridge_slave_0 entered promiscuous mode [ 55.491219][ T7208] IPVS: ftp: loaded support on port[0] = 21 [ 55.509799][ T7193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.533060][ T7177] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.540238][ T7177] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.565472][ T7177] device bridge_slave_1 entered promiscuous mode [ 55.614083][ T7174] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, 0x0, 0x2a}, 0x20) [ 55.705456][ T7179] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.719702][ T7179] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.772349][ T7179] device bridge_slave_0 entered promiscuous mode [ 55.814437][ T7177] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.845269][ T7177] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.885265][ T7179] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.894840][ T7179] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.921335][ T7179] device bridge_slave_1 entered promiscuous mode [ 56.029898][ T7177] team0: Port device team_slave_0 added [ 56.045647][ T7177] team0: Port device team_slave_1 added [ 56.098892][ T7179] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.171416][ T7179] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.229362][ T7208] chnl_net:caif_netlink_parms(): no params data found [ 56.305108][ T7177] device hsr_slave_0 entered promiscuous mode [ 56.305609][ C1] hrtimer: interrupt took 27571 ns [ 56.322483][ T7177] device hsr_slave_1 entered promiscuous mode [ 56.385561][ T7177] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.399810][ T7179] team0: Port device team_slave_0 added [ 56.412921][ T7179] team0: Port device team_slave_1 added [ 56.516457][ T7221] IPVS: ftp: loaded support on port[0] = 21 [ 56.575115][ T7208] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.600990][ T7208] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.640861][ T7208] device bridge_slave_0 entered promiscuous mode 04:07:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 56.765044][ T7179] device hsr_slave_0 entered promiscuous mode [ 56.792383][ T7179] device hsr_slave_1 entered promiscuous mode [ 56.852006][ T7179] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.866070][ T7208] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.888895][ T7208] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.933649][ T7208] device bridge_slave_1 entered promiscuous mode 04:07:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 57.126782][ T7208] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.209629][ T7208] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.474960][ T7208] team0: Port device team_slave_0 added [ 57.552315][ T7208] team0: Port device team_slave_1 added 04:07:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 57.885257][ T7208] device hsr_slave_0 entered promiscuous mode [ 57.922448][ T7208] device hsr_slave_1 entered promiscuous mode [ 57.972030][ T7208] debugfs: Directory 'hsr0' with parent '/' already present! [ 57.986344][ T7177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.012250][ T7221] chnl_net:caif_netlink_parms(): no params data found [ 58.072877][ T7177] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.107510][ T7277] IPVS: ftp: loaded support on port[0] = 21 [ 58.133809][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.162813][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.237374][ T7179] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.355993][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.392778][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.401604][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.408689][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state 04:07:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 58.751733][ T7179] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.796954][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.817673][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.882674][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.952706][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.046138][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.102549][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.109627][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.322129][ T7221] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.329244][ T7221] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.392862][ T7221] device bridge_slave_0 entered promiscuous mode 04:07:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 59.502234][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.511668][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.623523][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.642796][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.736930][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.802947][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.853073][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.942631][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.016399][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 04:07:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 60.086641][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.186307][ T7252] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.193434][ T7252] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.246676][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.343576][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.428191][ T7252] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.435424][ T7252] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.546858][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.653402][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.720617][ T7177] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.800901][ T7177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.876584][ T7221] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.892007][ T7221] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.900162][ T7221] device bridge_slave_1 entered promiscuous mode [ 61.011373][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.045849][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.094205][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.131389][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.182492][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.202803][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.259770][ T7208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.335032][ T7177] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.362758][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.378345][ T7179] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 61.400971][ T7179] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 04:07:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 61.428233][ T7221] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.488098][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.523243][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.561181][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.607124][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.655850][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.694147][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.747626][ T7208] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.810857][ T7179] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.899916][ T7221] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.952665][ T7301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.971411][ T7301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.007704][ T7301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.185804][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.199178][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.278766][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.285904][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.342798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.406765][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.456117][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.463495][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.527427][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.563295][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.649745][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.689809][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.726470][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.736697][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.768271][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.795635][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.807158][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.836320][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.862014][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.892753][ T7221] team0: Port device team_slave_0 added [ 62.903874][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.925802][ T7221] team0: Port device team_slave_1 added 04:07:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 62.965345][ T7301] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.998630][ T7277] chnl_net:caif_netlink_parms(): no params data found [ 63.108945][ T7221] device hsr_slave_0 entered promiscuous mode [ 63.162601][ T7221] device hsr_slave_1 entered promiscuous mode [ 63.212367][ T7221] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.239049][ T7208] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.449608][ T7277] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.475319][ T7277] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.515830][ T7277] device bridge_slave_0 entered promiscuous mode [ 63.536932][ T7277] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.558468][ T7277] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.616782][ T7277] device bridge_slave_1 entered promiscuous mode [ 63.725856][ T7386] ================================================================== [ 63.733995][ T7386] BUG: KCSAN: data-race in generic_permission / task_dump_owner [ 63.741615][ T7386] [ 63.743950][ T7386] write to 0xffff8881234a5d5c of 4 bytes by task 7382 on cpu 1: [ 63.747765][ T7277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.751628][ T7386] task_dump_owner+0x237/0x260 [ 63.765568][ T7386] pid_update_inode+0x3c/0x70 [ 63.770241][ T7386] pid_revalidate+0x91/0xd0 [ 63.774747][ T7386] lookup_fast+0x6f2/0x700 [ 63.779156][ T7386] walk_component+0x6d/0xe80 [ 63.783755][ T7386] link_path_walk.part.0+0x5d3/0xa90 [ 63.789037][ T7386] path_openat+0x14f/0x36e0 [ 63.793532][ T7386] do_filp_open+0x11e/0x1b0 [ 63.798031][ T7386] do_sys_open+0x3b3/0x4f0 [ 63.802442][ T7386] __x64_sys_open+0x55/0x70 [ 63.806937][ T7386] do_syscall_64+0xcc/0x370 [ 63.811432][ T7386] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.815244][ T7277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.817406][ T7386] [ 63.828732][ T7386] read to 0xffff8881234a5d5c of 4 bytes by task 7386 on cpu 0: [ 63.836278][ T7386] generic_permission+0x65/0x3d0 [ 63.841214][ T7386] proc_pid_permission+0xea/0x1c0 [ 63.846248][ T7386] inode_permission+0x241/0x3c0 [ 63.851098][ T7386] link_path_walk.part.0+0x622/0xa90 [ 63.856382][ T7386] path_openat+0x14f/0x36e0 [ 63.861052][ T7386] do_filp_open+0x11e/0x1b0 [ 63.865554][ T7386] do_sys_open+0x3b3/0x4f0 [ 63.870051][ T7386] __x64_sys_open+0x55/0x70 [ 63.874559][ T7386] do_syscall_64+0xcc/0x370 [ 63.879064][ T7386] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.884947][ T7386] [ 63.887273][ T7386] Reported by Kernel Concurrency Sanitizer on: [ 63.893420][ T7386] CPU: 0 PID: 7386 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 63.900169][ T7386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.907971][ T7277] team0: Port device team_slave_0 added [ 63.910225][ T7386] ================================================================== [ 63.923803][ T7386] Kernel panic - not syncing: panic_on_warn set ... [ 63.930384][ T7386] CPU: 0 PID: 7386 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 63.938779][ T7386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.947259][ T7277] team0: Port device team_slave_1 added [ 63.948821][ T7386] Call Trace: [ 63.948844][ T7386] dump_stack+0xf5/0x159 [ 63.948869][ T7386] panic+0x210/0x640 [ 63.965862][ T7386] ? do_syscall_64+0xcc/0x370 [ 63.970531][ T7386] ? vprintk_func+0x8d/0x140 [ 63.975149][ T7386] kcsan_report.cold+0xc/0x10 [ 63.979830][ T7386] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 63.985402][ T7386] __tsan_read4+0x2c/0x30 [ 63.989735][ T7386] generic_permission+0x65/0x3d0 [ 63.994676][ T7386] proc_pid_permission+0xea/0x1c0 [ 63.999703][ T7386] ? comm_show+0xb0/0xb0 [ 64.003948][ T7386] inode_permission+0x241/0x3c0 [ 64.008807][ T7386] link_path_walk.part.0+0x622/0xa90 [ 64.014274][ T7386] path_openat+0x14f/0x36e0 [ 64.018778][ T7386] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.024414][ T7386] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.030043][ T7386] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.035673][ T7386] ? __tsan_write4+0x32/0x40 [ 64.040259][ T7386] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.045903][ T7386] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 64.051795][ T7386] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.057427][ T7386] do_filp_open+0x11e/0x1b0 [ 64.061929][ T7386] ? __alloc_fd+0x316/0x4c0 [ 64.066437][ T7386] do_sys_open+0x3b3/0x4f0 [ 64.070857][ T7386] __x64_sys_open+0x55/0x70 [ 64.075366][ T7386] do_syscall_64+0xcc/0x370 [ 64.079869][ T7386] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 64.085759][ T7386] RIP: 0033:0x7f9fc7585120 [ 64.090176][ T7386] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 64.109784][ T7386] RSP: 002b:00007ffcc776e098 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 64.118200][ T7386] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f9fc7585120 [ 64.126170][ T7386] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f9fc7a53d00 [ 64.134143][ T7386] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f9fc784da10 [ 64.142112][ T7386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9fc7a52d00 [ 64.150086][ T7386] R13: 0000000001c501c0 R14: 0000000000000005 R15: 0000000000000000 [ 64.159503][ T7386] Kernel Offset: disabled [ 64.163828][ T7386] Rebooting in 86400 seconds..