[ 52.449878][ T26] audit: type=1800 audit(1573071052.527:28): pid=7929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 53.170113][ T7992] sshd (7992) used greatest stack depth: 10128 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.405047][ T26] audit: type=1800 audit(1573071053.607:29): pid=7929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 53.425212][ T26] audit: type=1800 audit(1573071053.607:30): pid=7929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.109' (ECDSA) to the list of known hosts. 2019/11/06 20:11:01 fuzzer started 2019/11/06 20:11:03 dialing manager at 10.128.0.105:44951 2019/11/06 20:11:03 syscalls: 2553 2019/11/06 20:11:03 code coverage: enabled 2019/11/06 20:11:03 comparison tracing: enabled 2019/11/06 20:11:03 extra coverage: extra coverage is not supported by the kernel 2019/11/06 20:11:03 setuid sandbox: enabled 2019/11/06 20:11:03 namespace sandbox: enabled 2019/11/06 20:11:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 20:11:03 fault injection: enabled 2019/11/06 20:11:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 20:11:03 net packet injection: enabled 2019/11/06 20:11:03 net device setup: enabled 2019/11/06 20:11:03 concurrency sanitizer: enabled 2019/11/06 20:11:03 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 73.074644][ T8101] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/06 20:11:14 adding functions to KCSAN blacklist: 'ext4_free_inode' 'generic_write_end' 'blk_mq_run_hw_queue' 'task_dump_owner' 'dd_has_work' 'sit_tunnel_xmit' 'add_timer' 'tick_nohz_next_event' 'vm_area_dup' 'run_timer_softirq' 'snapshot_refaults' 'snd_seq_check_queue' 'rcu_gp_fqs_check_wake' 'tick_sched_do_timer' 'rcu_gp_fqs_loop' 'd_lru_add' 'blk_mq_get_request' '__add_to_page_cache_locked' 'common_perm_cond' 'do_exit' 'tick_nohz_idle_stop_tick' 'find_get_pages_range_tag' 'mem_cgroup_select_victim_node' 'echo_char' 'blk_mq_sched_dispatch_requests' 'lruvec_lru_size' 'ext4_has_free_clusters' 'ext4_free_inodes_count' 'do_syslog' 'timer_clear_idle' 'generic_permission' 'ktime_get_seconds' 'p9_poll_workfn' 'mod_timer' 'blk_mq_dispatch_rq_list' 'ktime_get_real_seconds' 'taskstats_exit' 'osq_lock' 'tick_do_update_jiffies64' 'do_nanosleep' 'audit_log_start' 'tcp_add_backlog' 'process_srcu' 'kauditd_thread' 'fasync_remove_entry' 'inet_putpeer' 'pid_update_inode' 'wbt_done' 'xas_find_marked' 'shmem_add_to_page_cache' 'find_next_bit' 'init_peercred' 'queue_access_lock' '__ext4_new_inode' 'copy_process' 'pipe_poll' '__skb_try_recv_from_queue' 'generic_fillattr' 'ep_poll' 'ext4_mark_iloc_dirty' '__mark_inode_dirty' 'poll_schedule_timeout' 'xas_clear_mark' '__alloc_file' '__hrtimer_run_queues' 'tomoyo_supervisor' 'ext4_nonda_switch' 20:14:30 executing program 0: capset(&(0x7f0000002ffa)={0x20080522}, &(0x7f0000000000)) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) [ 270.632528][ T8103] IPVS: ftp: loaded support on port[0] = 21 20:14:30 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x2}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040), 0x8) [ 270.736065][ T8103] chnl_net:caif_netlink_parms(): no params data found [ 270.814611][ T8103] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.823416][ T8103] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.853284][ T8103] device bridge_slave_0 entered promiscuous mode [ 270.860572][ T8103] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.873877][ T8103] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.881645][ T8103] device bridge_slave_1 entered promiscuous mode [ 270.895964][ T8106] IPVS: ftp: loaded support on port[0] = 21 20:14:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) unshare(0x8020000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000700)='ns/mnt\x00') setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x3b7, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x119, 0x0, 0x0, {0x4}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x6, 0x6, @u32=0x4888}]}]}, 0x24}, 0x1, 0xf0ffff}, 0x0) shutdown(r1, 0x0) set_robust_list(&(0x7f0000000200)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x7, &(0x7f0000000100)}, 0x18) socket$inet(0x2, 0x0, 0x0) inotify_init1(0x0) gettid() [ 270.918917][ T8103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 270.946385][ T8103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 270.988084][ T8103] team0: Port device team_slave_0 added [ 271.006546][ T8103] team0: Port device team_slave_1 added [ 271.115818][ T8103] device hsr_slave_0 entered promiscuous mode 20:14:31 executing program 3: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x2, &(0x7f0000000140)=@raw=[@initr0], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000003c0), 0x8, 0x10, &(0x7f0000000400)={0x2, 0xe, 0x401, 0x6}, 0x10}, 0x70) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x0, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x11eeff7f) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) [ 271.163510][ T8103] device hsr_slave_1 entered promiscuous mode [ 271.225210][ T8106] chnl_net:caif_netlink_parms(): no params data found [ 271.252043][ T8109] IPVS: ftp: loaded support on port[0] = 21 [ 271.338806][ T8103] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.346004][ T8103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.353343][ T8103] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.360382][ T8103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.489880][ T8106] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.497172][ T8106] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.544742][ T8106] device bridge_slave_0 entered promiscuous mode [ 271.584490][ T8106] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.591593][ T8106] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.625166][ T8106] device bridge_slave_1 entered promiscuous mode [ 271.732045][ T8106] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.782046][ T3007] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.803449][ T3007] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.837049][ T8106] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.866703][ T8103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.890042][ T8137] IPVS: ftp: loaded support on port[0] = 21 [ 271.909356][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.925275][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:14:32 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="2400000020007be11dfffd946f610500020000061f00008100000800080017000400ff7e", 0x24}], 0x1}, 0x0) [ 271.957220][ T8103] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.065773][ T8106] team0: Port device team_slave_0 added [ 272.073960][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.113785][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.153665][ T8136] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.160820][ T8136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.204996][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.245173][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.285190][ T8136] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.292256][ T8136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.333887][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 272.361425][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.405707][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.437777][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.474425][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.503943][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.544480][ T8106] team0: Port device team_slave_1 added [ 272.606944][ T8103] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 272.624608][ T8103] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 272.669861][ T8140] IPVS: ftp: loaded support on port[0] = 21 [ 272.678055][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.696086][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.734168][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.754029][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.785137][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.824705][ T8109] chnl_net:caif_netlink_parms(): no params data found 20:14:33 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='barrier,session=0x000000100000db6']) [ 272.868403][ T8103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 272.897962][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.906218][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.936166][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.017601][ T8106] device hsr_slave_0 entered promiscuous mode [ 273.075817][ T8106] device hsr_slave_1 entered promiscuous mode [ 273.114025][ T8106] debugfs: Directory 'hsr0' with parent '/' already present! [ 273.208017][ T8109] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.217701][ T8152] IPVS: ftp: loaded support on port[0] = 21 [ 273.226150][ T8109] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.241277][ T8109] device bridge_slave_0 entered promiscuous mode [ 273.300135][ T8109] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.314265][ T8109] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.333303][ T8109] device bridge_slave_1 entered promiscuous mode [ 273.480116][ T8137] chnl_net:caif_netlink_parms(): no params data found [ 273.517230][ T8140] chnl_net:caif_netlink_parms(): no params data found [ 273.539630][ T8109] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 20:14:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x0, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x0]}}, 0x0, 0x27}, 0x20) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}], 0x3, 0x0) getgid() getgid() ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 273.597734][ T8109] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.663727][ T8106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.718030][ T8137] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.743414][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.779748][ T8137] device bridge_slave_0 entered promiscuous mode [ 273.812942][ T8106] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.844355][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.852242][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.920015][ T8109] team0: Port device team_slave_0 added [ 273.934522][ T8137] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.941594][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.967501][ T8137] device bridge_slave_1 entered promiscuous mode 20:14:34 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)) [ 274.017108][ T8140] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.030345][ T8140] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.052752][ T8140] device bridge_slave_0 entered promiscuous mode [ 274.094074][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.116940][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.165108][ T8135] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.172229][ T8135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.225652][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.255021][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 20:14:34 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x40000001}) timerfd_settime(r2, 0x0, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0xfffffffffffffcf3) r3 = dup3(r2, r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = memfd_create(&(0x7f0000001fc1)='/user\x00', 0x0) write(r6, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) [ 274.285974][ T8135] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.293100][ T8135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.343911][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.373703][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.414676][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.444025][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.453165][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.485779][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.505850][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.523106][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.545724][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.566146][ T8109] team0: Port device team_slave_1 added [ 274.583795][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 274.616401][ T8140] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.625877][ T8140] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.647412][ T8140] device bridge_slave_1 entered promiscuous mode [ 274.665171][ T8152] chnl_net:caif_netlink_parms(): no params data found [ 274.690899][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.724239][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 274.780641][ T8137] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.809929][ T8106] 8021q: adding VLAN 0 to HW filter on device batadv0 20:14:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000040)={0x14, 0x65, 0x10b}, 0x14}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 274.842023][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 274.877593][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 274.937726][ T8109] device hsr_slave_0 entered promiscuous mode [ 274.983679][ T8109] device hsr_slave_1 entered promiscuous mode [ 275.043832][ T8109] debugfs: Directory 'hsr0' with parent '/' already present! [ 275.052851][ T8137] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 275.081041][ T8140] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 275.152723][ T8140] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 275.188132][ T8152] bridge0: port 1(bridge_slave_0) entered blocking state 20:14:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x4, &(0x7f0000ad2000), &(0x7f0000000080)=0x144) [ 275.212116][ T8152] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.224260][ T8152] device bridge_slave_0 entered promiscuous mode [ 275.277905][ T8137] team0: Port device team_slave_0 added [ 275.306141][ T8152] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.353473][ T8152] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.361386][ T8152] device bridge_slave_1 entered promiscuous mode [ 275.420997][ T8140] team0: Port device team_slave_0 added [ 275.442841][ T8137] team0: Port device team_slave_1 added [ 275.535153][ T8140] team0: Port device team_slave_1 added 20:14:35 executing program 0: r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x8000000000000b0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 275.619470][ T8152] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 275.675984][ T8140] device hsr_slave_0 entered promiscuous mode 20:14:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x7a03, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000002f008151e00f80ecdb4cb904054865160b00030014000000000000140e00060005000000dc2976d153b4", 0x2e}], 0x1}, 0x0) [ 275.748563][ T8140] device hsr_slave_1 entered promiscuous mode [ 275.813401][ T8140] debugfs: Directory 'hsr0' with parent '/' already present! [ 275.869470][ T8246] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 275.885564][ T8137] device hsr_slave_0 entered promiscuous mode [ 275.899428][ T8246] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 275.913664][ T8137] device hsr_slave_1 entered promiscuous mode [ 275.963268][ T8137] debugfs: Directory 'hsr0' with parent '/' already present! [ 275.991274][ T8152] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 276.049422][ T8109] 8021q: adding VLAN 0 to HW filter on device bond0 20:14:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000000)={0x0, r2}) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x1}) [ 276.182544][ T8109] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.243183][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.251566][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.359120][ T8152] team0: Port device team_slave_0 added [ 276.400093][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.480852][ T8283] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 276.514269][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.586108][ T8136] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.593229][ T8136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.694886][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.759468][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.823950][ T8136] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.831164][ T8136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.931324][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.995749][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.143867][ T8152] team0: Port device team_slave_1 added [ 277.183651][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.191813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 277.296416][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 277.442993][ T8109] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 277.523410][ T8109] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 277.618529][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 277.627387][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 277.704143][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.713023][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 277.833912][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.842579][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.953786][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.967450][ T8140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.075793][ T8152] device hsr_slave_0 entered promiscuous mode [ 278.107485][ T8152] device hsr_slave_1 entered promiscuous mode [ 278.203383][ T8152] debugfs: Directory 'hsr0' with parent '/' already present! [ 278.222520][ T8140] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.277927][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.314059][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.321793][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.432639][ T8109] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 278.620515][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 278.654138][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 278.661575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.813770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.847399][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.854506][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.933738][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.942461][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.059951][ T8235] ================================================================== [ 279.068091][ T8235] BUG: KCSAN: data-race in pipe_wait / put_pipe_info [ 279.074763][ T8235] [ 279.077085][ T8235] read to 0xffff8880a842f58c of 4 bytes by task 8236 on cpu 1: [ 279.084633][ T8235] pipe_wait+0xd7/0x140 [ 279.088782][ T8235] pipe_read+0x3b1/0x5e0 [ 279.093014][ T8235] new_sync_read+0x389/0x4f0 [ 279.097595][ T8235] __vfs_read+0xb1/0xc0 [ 279.102001][ T8235] vfs_read+0x143/0x2c0 [ 279.106148][ T8235] ksys_read+0xd5/0x1b0 [ 279.110296][ T8235] __x64_sys_read+0x4c/0x60 [ 279.114793][ T8235] do_syscall_64+0xcc/0x370 [ 279.119290][ T8235] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.125160][ T8235] [ 279.127492][ T8235] write to 0xffff8880a842f58c of 4 bytes by task 8235 on cpu 0: [ 279.135114][ T8235] put_pipe_info+0x4d/0xb0 [ 279.139520][ T8235] pipe_release+0x152/0x1b0 [ 279.144016][ T8235] __fput+0x1e1/0x520 [ 279.148027][ T8235] ____fput+0x1f/0x30 [ 279.152007][ T8235] task_work_run+0xf6/0x130 [ 279.156692][ T8235] exit_to_usermode_loop+0x2b4/0x2c0 [ 279.161983][ T8235] do_syscall_64+0x353/0x370 [ 279.166572][ T8235] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.172445][ T8235] [ 279.174759][ T8235] Reported by Kernel Concurrency Sanitizer on: [ 279.180919][ T8235] CPU: 0 PID: 8235 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 279.187664][ T8235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.197706][ T8235] ================================================================== [ 279.205764][ T8235] Kernel panic - not syncing: panic_on_warn set ... [ 279.212339][ T8235] CPU: 0 PID: 8235 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 279.219084][ T8235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.229208][ T8235] Call Trace: [ 279.232499][ T8235] dump_stack+0xf5/0x159 [ 279.236751][ T8235] panic+0x210/0x640 [ 279.240649][ T8235] ? vprintk_func+0x8d/0x140 [ 279.245237][ T8235] kcsan_report.cold+0xc/0xe [ 279.249826][ T8235] kcsan_setup_watchpoint+0x3fe/0x410 [ 279.255190][ T8235] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 279.260991][ T8235] __tsan_unaligned_write4+0x143/0x1f0 [ 279.266445][ T8235] put_pipe_info+0x4d/0xb0 [ 279.270857][ T8235] pipe_release+0x152/0x1b0 [ 279.275356][ T8235] __fput+0x1e1/0x520 [ 279.279333][ T8235] ? put_pipe_info+0xb0/0xb0 [ 279.283924][ T8235] ____fput+0x1f/0x30 [ 279.287920][ T8235] task_work_run+0xf6/0x130 [ 279.292423][ T8235] exit_to_usermode_loop+0x2b4/0x2c0 [ 279.297707][ T8235] do_syscall_64+0x353/0x370 [ 279.302309][ T8235] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.308190][ T8235] RIP: 0033:0x7fcfed0f32b0 [ 279.312611][ T8235] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 279.332997][ T8235] RSP: 002b:00007ffd2bc7b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 279.341398][ T8235] RAX: 0000000000000000 RBX: 00007fcfed3a87a0 RCX: 00007fcfed0f32b0 [ 279.349363][ T8235] RDX: 00007fcfed3a9df0 RSI: 0000000000000001 RDI: 0000000000000001 [ 279.357323][ T8235] RBP: 0000000000000000 R08: 00007fcfed7ec700 R09: 00007fcfed7ec700 [ 279.365284][ T8235] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 279.373253][ T8235] R13: 0000000000000001 R14: 0000000000c04160 R15: 0000000000000000 [ 279.382698][ T8235] Kernel Offset: disabled [ 279.387018][ T8235] Rebooting in 86400 seconds..