[info] Using makefile-style concurrent boot in runlevel 2. [ 43.279935][ T26] audit: type=1800 audit(1574044810.730:21): pid=7543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 43.328225][ T26] audit: type=1800 audit(1574044810.740:22): pid=7543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.59' (ECDSA) to the list of known hosts. 2019/11/18 02:40:20 fuzzer started 2019/11/18 02:40:21 dialing manager at 10.128.0.105:33487 2019/11/18 02:40:22 syscalls: 2566 2019/11/18 02:40:22 code coverage: enabled 2019/11/18 02:40:22 comparison tracing: enabled 2019/11/18 02:40:22 extra coverage: extra coverage is not supported by the kernel 2019/11/18 02:40:22 setuid sandbox: enabled 2019/11/18 02:40:22 namespace sandbox: enabled 2019/11/18 02:40:22 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/18 02:40:22 fault injection: enabled 2019/11/18 02:40:22 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/18 02:40:22 net packet injection: enabled 2019/11/18 02:40:22 net device setup: enabled 2019/11/18 02:40:22 concurrency sanitizer: enabled 2019/11/18 02:40:22 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 65.881269][ T7707] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/18 02:40:37 adding functions to KCSAN blacklist: 'ext4_has_free_clusters' 'pipe_poll' 'blk_mq_dispatch_rq_list' 'taskstats_exit' 'do_syslog' 'pid_update_inode' 'get_signal' 'xas_clear_mark' 'inode_sync_complete' 'fsnotify' 'mod_timer' 'n_tty_receive_buf_common' 'mem_cgroup_select_victim_node' '__mark_inode_dirty' '__process_echoes' 'shmem_getpage_gfp' 'generic_file_read_iter' 'inode_permission' 'virtqueue_enable_cb_delayed' 'snd_seq_check_queue' 'tomoyo_supervisor' 'tick_nohz_idle_stop_tick' 'page_counter_try_charge' 'ext4_nonda_switch' 'delete_from_page_cache_batch' 'process_srcu' 'mm_update_next_owner' 'ext4_mark_iloc_dirty' 'find_get_pages_range_tag' 'echo_char' 'kauditd_thread' 'list_lru_count_one' 'pipe_wait' 'inet_send_prepare' '__hrtimer_run_queues' 'ep_poll' 'ext4_free_inode' 'run_timer_softirq' 'wbt_done' 'dd_has_work' 'wbt_issue' 'sctp_assoc_migrate' 'ext4_writepages' 'futex_wait_queue_me' 'ktime_get_seconds' 'relay_switch_subbuf' 'vm_area_dup' 'blk_mq_run_hw_queue' 'pcpu_alloc' 'tcp_add_backlog' 'do_exit' 'ext4_free_inodes_count' 'fprop_fraction_percpu' 'filemap_map_pages' 'generic_write_end' 'timer_clear_idle' 'blk_stat_add' '__dev_queue_xmit' 'do_signal_stop' 'rcu_gp_fqs_check_wake' 'tick_do_update_jiffies64' 'tick_sched_do_timer' 'add_timer' 'lruvec_lru_size' '__delete_from_page_cache' 'netlink_overrun' 'ext4_da_write_end' 'find_next_bit' 'do_nanosleep' 'yama_ptracer_del' 'audit_log_start' 'rcu_gp_fqs_loop' 'ktime_get_real_seconds' 'xas_find_marked' 'ondemand_readahead' 'poll_schedule_timeout' 'find_group_orlov' 'p9_poll_workfn' 'commit_echoes' 'shmem_add_to_page_cache' 'ip_tunnel_xmit' '__add_to_page_cache_locked' '__ext4_new_inode' 'blk_mq_get_request' '__snd_rawmidi_transmit_ack' 'snd_ctl_notify' 'queue_access_lock' 'blk_mq_sched_dispatch_requests' 'copy_process' 'generic_fillattr' 'balance_dirty_pages' 'snd_seq_prioq_cell_out' 02:44:42 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468000000001800020009e6010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5f0000002c00010700000000dd44eab137000000", @ANYRES32=r3, @ANYBLOB="000000000000000003000000080001006270660050000200080004360000000000040004f7400002003c0001000000ff030004000000000000004000000000e6110000000000000000100000000000000000000000aab4bb0e215ddab2263549032700"/113], 0x7c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 02:44:42 executing program 1: openat$rfkill(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) alarm(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 315.158846][ T7711] IPVS: ftp: loaded support on port[0] = 21 [ 315.267386][ T7711] chnl_net:caif_netlink_parms(): no params data found [ 315.323860][ T7711] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.331153][ T7711] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.344420][ T7711] device bridge_slave_0 entered promiscuous mode [ 315.352536][ T7711] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.359990][ T7711] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.368748][ T7711] device bridge_slave_1 entered promiscuous mode [ 315.387360][ T7711] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.398081][ T7711] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.413291][ T7715] IPVS: ftp: loaded support on port[0] = 21 [ 315.418455][ T7711] team0: Port device team_slave_0 added [ 315.428971][ T7711] team0: Port device team_slave_1 added 02:44:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000000110000006c000000000100009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) [ 315.533478][ T7711] device hsr_slave_0 entered promiscuous mode [ 315.602062][ T7711] device hsr_slave_1 entered promiscuous mode [ 315.687353][ T7719] IPVS: ftp: loaded support on port[0] = 21 02:44:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, 0x0) pipe(0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) fchdir(0xffffffffffffffff) [ 315.765150][ T7711] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.772421][ T7711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.779805][ T7711] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.786983][ T7711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.877823][ T7715] chnl_net:caif_netlink_parms(): no params data found [ 316.054378][ T7715] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.081561][ T7715] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.089398][ T7715] device bridge_slave_0 entered promiscuous mode [ 316.142631][ T7715] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.149749][ T7715] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.202234][ T7715] device bridge_slave_1 entered promiscuous mode [ 316.247840][ T7711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 316.302520][ T7715] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.342725][ T7716] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.371749][ T7716] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.401978][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 316.440893][ T7711] 8021q: adding VLAN 0 to HW filter on device team0 [ 316.448193][ T7746] IPVS: ftp: loaded support on port[0] = 21 02:44:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x120) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1a) socket$xdp(0x2c, 0x3, 0x0) [ 316.482901][ T7715] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.511800][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.523539][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.632699][ T7715] team0: Port device team_slave_0 added [ 316.651706][ T7715] team0: Port device team_slave_1 added [ 316.673478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 316.702138][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.742973][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.751256][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.823120][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 316.853194][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.882592][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.889695][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.923701][ T7719] chnl_net:caif_netlink_parms(): no params data found [ 316.951811][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 317.028150][ T7752] IPVS: ftp: loaded support on port[0] = 21 [ 317.030928][ T7711] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 317.071352][ T7711] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 317.123280][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 317.133471][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 317.163088][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 317.193599][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 317.222006][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 317.252343][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 317.283580][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 02:44:44 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x230, 0x0, &(0x7f0000000140)=[@acquire={0x40046304}, @acquire, @request_death, @release, @register_looper, @dead_binder_done, @clear_death, @acquire_done={0x40406301}, @free_buffer], 0x1000001ed, 0x8126000, 0x0}) [ 317.312463][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 317.335654][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.377929][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 317.396760][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 317.463886][ T7715] device hsr_slave_0 entered promiscuous mode [ 317.521982][ T7715] device hsr_slave_1 entered promiscuous mode [ 317.591493][ T7715] debugfs: Directory 'hsr0' with parent '/' already present! [ 317.617226][ T7711] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.653462][ T7762] IPVS: ftp: loaded support on port[0] = 21 [ 317.659671][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 317.671310][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 317.700207][ T7719] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.707711][ T7719] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.717863][ T7719] device bridge_slave_0 entered promiscuous mode [ 317.771564][ T7719] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.778723][ T7719] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.791904][ T7719] device bridge_slave_1 entered promiscuous mode [ 317.917535][ T7746] chnl_net:caif_netlink_parms(): no params data found [ 317.949674][ T7719] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 318.039038][ T7719] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 318.090220][ T7715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.168002][ T7796] netlink: 51 bytes leftover after parsing attributes in process `syz-executor.0'. [ 318.195030][ T7719] team0: Port device team_slave_0 added [ 318.203029][ T7719] team0: Port device team_slave_1 added [ 318.208839][ T7794] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 318.239551][ T7715] 8021q: adding VLAN 0 to HW filter on device team0 02:44:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2902001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000100)=0x2, 0x0, 0x2, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) [ 318.334686][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.351999][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 318.393844][ T7752] chnl_net:caif_netlink_parms(): no params data found [ 318.433492][ T7719] device hsr_slave_0 entered promiscuous mode [ 318.483373][ T7719] device hsr_slave_1 entered promiscuous mode [ 318.523716][ T7719] debugfs: Directory 'hsr0' with parent '/' already present! [ 318.553098][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.564715][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.591959][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.599096][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.623767][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.663709][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.684292][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.691389][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state 02:44:46 executing program 0: [ 318.723985][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 318.743884][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 318.764291][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 318.783983][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 318.812412][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 318.851981][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 318.883940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 318.903924][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.924133][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 02:44:46 executing program 0: [ 318.951886][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 318.975382][ T7746] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.013065][ T7746] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.048553][ T7746] device bridge_slave_0 entered promiscuous mode [ 319.156216][ T7715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 319.208625][ T7762] chnl_net:caif_netlink_parms(): no params data found [ 319.229533][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 319.245818][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 02:44:46 executing program 0: [ 319.305609][ T7746] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.322501][ T7746] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.376405][ T7746] device bridge_slave_1 entered promiscuous mode 02:44:47 executing program 0: [ 319.517100][ T7752] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.554050][ T7752] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.582356][ T7752] device bridge_slave_0 entered promiscuous mode [ 319.662429][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 319.669877][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 02:44:47 executing program 0: [ 319.716024][ T7715] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 319.763592][ T7746] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 319.810578][ T7752] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.821404][ T7752] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.829370][ T7752] device bridge_slave_1 entered promiscuous mode [ 319.917784][ T7746] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:44:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet(0x10, 0x2, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket(0x40000000015, 0x805, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r4, 0x114, 0xa, 0x0, 0x0) poll(&(0x7f0000000080)=[{}, {}, {}], 0x3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000000c0)={{0x0, 0x0, @identifier="4f2ceaa6e078a79182b438a13df57a29"}}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1206bacce7c11c8c7c1c3d64828653555d58c559a9b736ee2a7bfdd26856d7cbbc3be901c60000000000000000b5df9a240d6cac510016f2f36e31283fbe2b95f4ccd1111ad7aa4c87b5c2f04a21b786b298d9b2ae552e20953bb859c731ebc40507b78eb742875807fe7577eaac3ef5f4"], 0x71) [ 319.961324][ T7752] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 319.970570][ T7762] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.979625][ T7762] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.045108][ T7762] device bridge_slave_0 entered promiscuous mode [ 320.098317][ T7752] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 320.117768][ T7762] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.131539][ T7762] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.169323][ T7762] device bridge_slave_1 entered promiscuous mode [ 320.192665][ T7746] team0: Port device team_slave_0 added [ 320.201256][ T7719] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.265994][ T7719] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.297625][ T7746] team0: Port device team_slave_1 added [ 320.338804][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.347147][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.377800][ T7762] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 320.400917][ T7752] team0: Port device team_slave_0 added [ 320.463827][ T7746] device hsr_slave_0 entered promiscuous mode [ 320.491709][ T7746] device hsr_slave_1 entered promiscuous mode [ 320.504890][ T7857] IPVS: ftp: loaded support on port[0] = 21 [ 320.531706][ T7746] debugfs: Directory 'hsr0' with parent '/' already present! [ 320.544564][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.560096][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.631628][ T7860] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 320.637059][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.654920][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.791482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.800558][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.809577][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.816641][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.825033][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.834596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.843988][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.853014][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.862563][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.880008][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.904217][ T7719] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 320.924818][ T7719] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.950015][ T7762] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 320.964595][ T7752] team0: Port device team_slave_1 added [ 320.976949][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.987168][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 321.016292][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.049386][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.064452][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.081408][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.116506][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 321.145551][ T7762] team0: Port device team_slave_0 added [ 321.179653][ T7762] team0: Port device team_slave_1 added [ 321.243984][ T7752] device hsr_slave_0 entered promiscuous mode [ 321.302840][ T7874] IPVS: ftp: loaded support on port[0] = 21 [ 321.322267][ T7752] device hsr_slave_1 entered promiscuous mode [ 321.371372][ T7752] debugfs: Directory 'hsr0' with parent '/' already present! [ 321.467073][ T7866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 321.511933][ T7866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 321.551860][ T7719] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.676694][ T7762] device hsr_slave_0 entered promiscuous mode [ 321.741687][ T7762] device hsr_slave_1 entered promiscuous mode [ 321.774773][ T7762] debugfs: Directory 'hsr0' with parent '/' already present! [ 322.135007][ T7746] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.308054][ T7752] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.387263][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.410728][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.489561][ T7746] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.544060][ T7752] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.592099][ T7762] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.627824][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.652166][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.671085][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.705412][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.764997][ T2983] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.772184][ T2983] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.875540][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.952035][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.021261][ T2983] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.028402][ T2983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.132016][ T2983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 323.239917][ T7762] 8021q: adding VLAN 0 to HW filter on device team0 [ 323.354410][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.392156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.464611][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.524337][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.531563][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.589994][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 323.654537][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.723202][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.791795][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.799045][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.912021][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 324.002206][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 324.010899][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.125968][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 324.215267][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 324.295104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.365802][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 324.441996][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.509463][ T7746] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 324.604320][ T7746] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 324.792351][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 324.832245][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 324.892110][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.900576][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.035123][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 325.102137][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 325.111107][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 325.229129][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.283167][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 325.333992][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 325.385798][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 325.402330][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 325.432560][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 325.452093][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.532955][ T7746] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 325.606340][ T7752] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 325.652101][ T7752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 325.665125][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 325.685159][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.751748][ T7745] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.758830][ T7745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.822039][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 325.830810][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.891945][ T7745] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.899029][ T7745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.938232][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 325.978145][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 325.992619][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 326.000277][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 326.016825][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 326.025890][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.037657][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.049472][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.069547][ T7762] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 326.092834][ T7762] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 326.112204][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 326.120657][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 326.132413][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 326.140978][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.155112][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.165583][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.176084][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.186607][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.197167][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 326.206844][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 326.220089][ T7752] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.234298][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 326.250929][ T7762] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.260972][ T7866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 326.269396][ T7866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 326.521737][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 326.538159][ T8002] binder: 8000:8002 ioctl c0306201 20000080 returned -14 02:44:54 executing program 1: openat$rfkill(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) alarm(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:44:54 executing program 2: 02:44:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet(0x10, 0x2, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket(0x40000000015, 0x805, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r4, 0x114, 0xa, 0x0, 0x0) poll(&(0x7f0000000080)=[{}, {}, {}], 0x3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000000c0)={{0x0, 0x0, @identifier="4f2ceaa6e078a79182b438a13df57a29"}}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1206bacce7c11c8c7c1c3d64828653555d58c559a9b736ee2a7bfdd26856d7cbbc3be901c60000000000000000b5df9a240d6cac510016f2f36e31283fbe2b95f4ccd1111ad7aa4c87b5c2f04a21b786b298d9b2ae552e20953bb859c731ebc40507b78eb742875807fe7577eaac3ef5f4"], 0x71) [ 327.200997][ T8017] IPVS: ftp: loaded support on port[0] = 21 [ 327.302218][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:44:54 executing program 5: 02:44:54 executing program 3: 02:44:54 executing program 2: 02:44:54 executing program 4: 02:44:55 executing program 5: 02:44:55 executing program 2: 02:44:55 executing program 3: 02:44:55 executing program 4: 02:44:55 executing program 1: 02:44:55 executing program 5: 02:44:55 executing program 2: 02:44:55 executing program 0: 02:44:55 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 02:44:55 executing program 4: 02:44:55 executing program 3: 02:44:55 executing program 5: 02:44:55 executing program 1: 02:44:55 executing program 0: 02:44:55 executing program 2: 02:44:55 executing program 4: 02:44:55 executing program 3: 02:44:55 executing program 5: 02:44:55 executing program 0: 02:44:55 executing program 1: 02:44:56 executing program 2: 02:44:56 executing program 4: 02:44:56 executing program 0: 02:44:56 executing program 5: 02:44:56 executing program 3: 02:44:56 executing program 2: 02:44:56 executing program 1: 02:44:56 executing program 4: 02:44:56 executing program 0: 02:44:56 executing program 3: 02:44:56 executing program 5: 02:44:56 executing program 2: 02:44:56 executing program 1: 02:44:56 executing program 4: 02:44:56 executing program 0: 02:44:56 executing program 5: 02:44:56 executing program 3: 02:44:56 executing program 2: 02:44:56 executing program 1: 02:44:56 executing program 4: [ 329.528233][ T7723] ================================================================== [ 329.537182][ T7723] BUG: KCSAN: data-race in poll_schedule_timeout.constprop.0 / pollwake [ 329.545508][ T7723] [ 329.547844][ T7723] write to 0xffffc900016bfc30 of 4 bytes by task 8111 on cpu 0: [ 329.555491][ T7723] pollwake+0xe3/0x140 [ 329.559564][ T7723] __wake_up_common+0x7b/0x180 [ 329.564330][ T7723] __wake_up_common_lock+0x77/0xb0 [ 329.569442][ T7723] __wake_up+0xe/0x10 [ 329.573562][ T7723] __send_signal+0x70e/0x870 02:44:57 executing program 5: 02:44:57 executing program 3: [ 329.578188][ T7723] send_signal+0x224/0x2b0 [ 329.582607][ T7723] do_notify_parent+0x55b/0x5e0 [ 329.587458][ T7723] do_exit+0x1723/0x18f0 [ 329.591784][ T7723] do_group_exit+0xb4/0x1c0 [ 329.596286][ T7723] __x64_sys_exit_group+0x2e/0x30 [ 329.601311][ T7723] do_syscall_64+0xcc/0x370 [ 329.605825][ T7723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.611711][ T7723] [ 329.614040][ T7723] read to 0xffffc900016bfc30 of 4 bytes by task 7723 on cpu 1: [ 329.621701][ T7723] poll_schedule_timeout.constprop.0+0x50/0xc0 02:44:57 executing program 1: [ 329.627865][ T7723] do_sys_poll+0x66d/0x990 [ 329.632287][ T7723] __x64_sys_poll+0x10f/0x250 [ 329.636972][ T7723] do_syscall_64+0xcc/0x370 [ 329.641504][ T7723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.647391][ T7723] [ 329.649724][ T7723] Reported by Kernel Concurrency Sanitizer on: [ 329.655891][ T7723] CPU: 1 PID: 7723 Comm: udevd Not tainted 5.4.0-rc7+ #0 [ 329.662912][ T7723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.673010][ T7723] ================================================================== [ 329.681073][ T7723] Kernel panic - not syncing: panic_on_warn set ... [ 329.687757][ T7723] CPU: 1 PID: 7723 Comm: udevd Not tainted 5.4.0-rc7+ #0 [ 329.694783][ T7723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.704928][ T7723] Call Trace: [ 329.708235][ T7723] dump_stack+0x11d/0x181 [ 329.712571][ T7723] panic+0x210/0x640 [ 329.717511][ T7723] ? vprintk_func+0x8d/0x140 [ 329.722111][ T7723] kcsan_report.cold+0xc/0xd [ 329.726818][ T7723] kcsan_setup_watchpoint+0x3fe/0x460 [ 329.732222][ T7723] __tsan_read4+0xc6/0x100 [ 329.736642][ T7723] poll_schedule_timeout.constprop.0+0x50/0xc0 [ 329.742796][ T7723] do_sys_poll+0x66d/0x990 [ 329.747334][ T7723] ? __rcu_read_unlock+0x66/0x3c0 [ 329.752374][ T7723] ? __update_load_avg_cfs_rq+0x1e8/0x2d0 [ 329.758208][ T7723] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 329.764112][ T7723] ? __read_once_size+0x5a/0xe0 [ 329.768973][ T7723] ? page_trans_huge_mapcount+0x21f/0x2b0 [ 329.774811][ T7723] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 329.780906][ T7723] ? constant_test_bit+0x12/0x30 [ 329.785856][ T7723] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 329.792129][ T7723] ? page_trans_huge_map_swapcount+0x3ea/0x5c0 [ 329.798378][ T7723] ? poll_select_finish+0x440/0x440 [ 329.803617][ T7723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.809890][ T7723] ? debug_smp_processor_id+0x4c/0x172 [ 329.815528][ T7723] ? __read_once_size+0xe0/0xe0 [ 329.821269][ T7723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.827518][ T7723] ? debug_smp_processor_id+0x4c/0x172 [ 329.832982][ T7723] ? __read_once_size+0xe0/0xe0 [ 329.838007][ T7723] ? __call_rcu+0x153/0x390 [ 329.842606][ T7723] ? __read_once_size+0xe0/0xe0 [ 329.847456][ T7723] ? call_rcu+0x29/0x30 [ 329.851627][ T7723] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 329.857524][ T7723] ? __read_once_size+0x5a/0xe0 [ 329.862429][ T7723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.868679][ T7723] ? ktime_get_ts64+0x286/0x2c0 [ 329.873542][ T7723] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 329.879273][ T7723] ? timespec64_add_safe+0xae/0xd0 [ 329.884400][ T7723] __x64_sys_poll+0x10f/0x250 [ 329.889087][ T7723] do_syscall_64+0xcc/0x370 [ 329.893643][ T7723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.899620][ T7723] RIP: 0033:0x7fd119082678 [ 329.904193][ T7723] Code: 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 82 8f 2b 00 85 c0 75 17 48 63 d2 b8 07 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 329.924066][ T7723] RSP: 002b:00007fff5ce73ea0 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 329.932849][ T7723] RAX: ffffffffffffffda RBX: 20c49ba5e353f7cf RCX: 00007fd119082678 [ 329.940918][ T7723] RDX: 000000000000edfb RSI: 0000000000000001 RDI: 00007fff5ce73f60 [ 329.948892][ T7723] RBP: 0000000000000000 R08: 00007fff5cf8b090 R09: 000000000000f550 [ 329.956952][ T7723] R10: 00007fff5ce73eb8 R11: 0000000000000246 R12: 0000000001994e00 [ 329.965044][ T7723] R13: 0000000000001faf R14: 00007fff5ce73f34 R15: 0000000001984250 [ 329.975193][ T7723] Kernel Offset: disabled [ 329.979614][ T7723] Rebooting in 86400 seconds..