[ 50.888923][ T26] audit: type=1800 audit(1572963684.956:28): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 51.548640][ T7947] sshd (7947) used greatest stack depth: 10128 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 51.822472][ T26] audit: type=1800 audit(1572963685.976:29): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 51.842596][ T26] audit: type=1800 audit(1572963685.976:30): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.47' (ECDSA) to the list of known hosts. 2019/11/05 14:21:35 fuzzer started 2019/11/05 14:21:37 dialing manager at 10.128.0.105:43787 2019/11/05 14:21:37 syscalls: 2553 2019/11/05 14:21:37 code coverage: enabled 2019/11/05 14:21:37 comparison tracing: enabled 2019/11/05 14:21:37 extra coverage: extra coverage is not supported by the kernel 2019/11/05 14:21:37 setuid sandbox: enabled 2019/11/05 14:21:37 namespace sandbox: enabled 2019/11/05 14:21:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 14:21:37 fault injection: enabled 2019/11/05 14:21:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 14:21:37 net packet injection: enabled 2019/11/05 14:21:37 net device setup: enabled 2019/11/05 14:21:37 concurrency sanitizer: enabled 2019/11/05 14:21:37 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/05 14:21:37 adding functions to KCSAN blacklist: 'generic_permission' '__hrtimer_run_queues' 'tomoyo_supervisor' 14:21:39 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000040)) 14:21:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) syzkaller login: [ 65.310469][ T8054] IPVS: ftp: loaded support on port[0] = 21 [ 65.416327][ T8054] chnl_net:caif_netlink_parms(): no params data found [ 65.487373][ T8054] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.503190][ T8054] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.511427][ T8054] device bridge_slave_0 entered promiscuous mode [ 65.530035][ T8057] IPVS: ftp: loaded support on port[0] = 21 [ 65.533419][ T8054] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.543995][ T8054] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.551876][ T8054] device bridge_slave_1 entered promiscuous mode [ 65.575215][ T8054] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.588186][ T8054] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:21:39 executing program 2: ptrace$peek(0x2, 0x0, &(0x7f0000000040)) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd1e}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600203f00000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000e2ffffffff00170000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020aa009070000000000030000b3480005001a00aea466aa000a00000000505193943c7f3cbecab5170000fe800a3f5b111a59050a00002000002465e38e4523731e3405003ee6e8d84cc21b35f78276f48cfa9072593c8e"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000008a, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) [ 65.631027][ T8054] team0: Port device team_slave_0 added [ 65.644067][ T8054] team0: Port device team_slave_1 added [ 65.745707][ T8054] device hsr_slave_0 entered promiscuous mode [ 65.793514][ T8054] device hsr_slave_1 entered promiscuous mode [ 65.873359][ T8057] chnl_net:caif_netlink_parms(): no params data found [ 65.889434][ T8060] IPVS: ftp: loaded support on port[0] = 21 [ 65.952194][ T8054] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.959414][ T8054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.966760][ T8054] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.973833][ T8054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.082780][ T8057] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.101863][ T8057] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.124029][ T8057] device bridge_slave_0 entered promiscuous mode [ 66.155948][ T8057] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.163052][ T8057] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.171648][ T8057] device bridge_slave_1 entered promiscuous mode [ 66.238197][ T8054] 8021q: adding VLAN 0 to HW filter on device bond0 14:21:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') rmdir(&(0x7f0000000080)='./bus\x00') [ 66.307042][ T8057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.329694][ T8054] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.377233][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.386508][ T2405] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.423468][ T2405] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.455067][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 66.516445][ T8057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.614004][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.632540][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.670203][ T2864] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.677400][ T2864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.715170][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.743808][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.773559][ T2864] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.780625][ T2864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.825011][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.845785][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.875086][ T8057] team0: Port device team_slave_0 added [ 66.902036][ T8089] IPVS: ftp: loaded support on port[0] = 21 [ 66.919297][ T8060] chnl_net:caif_netlink_parms(): no params data found [ 66.947858][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.963948][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.983958][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.003803][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.024143][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.055010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.083885][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 14:21:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = creat(&(0x7f0000000080)='./file0\x00', 0x4003) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYRESOCT=0x0], 0x17) close(r1) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000180)='/dev/uinput\x00'], 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000200)=[&(0x7f0000000000)='c=usetselinux^md5sum,selfcpuset+#\\cpuset\x00']) [ 67.115100][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.144714][ T8057] team0: Port device team_slave_1 added [ 67.151705][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.191584][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.307722][ T8057] device hsr_slave_0 entered promiscuous mode [ 67.365671][ T8057] device hsr_slave_1 entered promiscuous mode [ 67.423190][ T8057] debugfs: Directory 'hsr0' with parent '/' already present! [ 67.431099][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 67.463329][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 67.472524][ T8054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.509671][ T8060] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.523752][ T8060] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.555533][ T8060] device bridge_slave_0 entered promiscuous mode [ 67.637822][ T8060] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.653192][ T8060] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.715396][ T8060] device bridge_slave_1 entered promiscuous mode [ 67.791019][ T8096] IPVS: ftp: loaded support on port[0] = 21 [ 67.846954][ T8060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.878572][ T8060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.083454][ T8089] chnl_net:caif_netlink_parms(): no params data found [ 68.142467][ T8060] team0: Port device team_slave_0 added [ 68.168303][ T8060] team0: Port device team_slave_1 added 14:21:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) dup2(r1, r0) 14:21:42 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000040)) [ 68.286888][ T8057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.337144][ T8089] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.353340][ T8089] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.361212][ T8089] device bridge_slave_0 entered promiscuous mode 14:21:42 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000040)) [ 68.455559][ T8060] device hsr_slave_0 entered promiscuous mode [ 68.493448][ T8060] device hsr_slave_1 entered promiscuous mode [ 68.543294][ T8060] debugfs: Directory 'hsr0' with parent '/' already present! [ 68.560699][ T8057] 8021q: adding VLAN 0 to HW filter on device team0 14:21:42 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000040)) [ 68.588438][ T8089] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.603313][ T8089] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.611311][ T8089] device bridge_slave_1 entered promiscuous mode [ 68.669679][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.713811][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.791346][ T8089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.862930][ T8057] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 68.906649][ T8057] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.973298][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.987664][ T8136] IPVS: ftp: loaded support on port[0] = 21 [ 69.006260][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 14:21:43 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000040)) [ 69.059038][ T2864] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.066149][ T2864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.173814][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.182542][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.273598][ T2864] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.280663][ T2864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.355942][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 14:21:43 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000040)) [ 69.396353][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.452595][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.503969][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.564255][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.572904][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.647434][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 14:21:43 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000040)) [ 69.693957][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.702489][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.814005][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.864604][ T8089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.920336][ T8057] 8021q: adding VLAN 0 to HW filter on device batadv0 14:21:44 executing program 0: ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0) process_vm_writev(0x0, &(0x7f0000000bc0)=[{&(0x7f0000000dc0)=""/165, 0xa5}, {&(0x7f0000000480)=""/42, 0x2a}, {&(0x7f0000000ac0)=""/249, 0xf9}], 0x3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000002140)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stack\x00') prctl$PR_GET_DUMPABLE(0x3) preadv(r1, &(0x7f00000017c0), 0x59, 0x0) [ 69.968933][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.990697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.104378][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.112069][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 70.186622][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 70.234618][ C0] hrtimer: interrupt took 25498 ns [ 70.296504][ T8089] team0: Port device team_slave_0 added [ 70.339584][ T8060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.429872][ T8089] team0: Port device team_slave_1 added [ 70.447431][ T8096] chnl_net:caif_netlink_parms(): no params data found [ 70.468210][ T8060] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.517704][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.537783][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.735992][ T8089] device hsr_slave_0 entered promiscuous mode [ 70.783461][ T8089] device hsr_slave_1 entered promiscuous mode [ 70.826553][ T8089] debugfs: Directory 'hsr0' with parent '/' already present! [ 70.839682][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.856201][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.881761][ T8088] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.888937][ T8088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.919332][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.940189][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.961145][ T8088] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.968278][ T8088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.015747][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.051301][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.088481][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.116788][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.152045][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.181317][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.242484][ T8060] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 71.263310][ T8060] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 71.358445][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.367598][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.418325][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.452699][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 14:21:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) [ 71.462907][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.490339][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.541997][ T8096] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.556102][ T8096] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.582852][ T8096] device bridge_slave_0 entered promiscuous mode [ 71.654453][ T8060] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.684616][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.699305][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.728042][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.764984][ T8096] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.782476][ T8096] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.821010][ T8096] device bridge_slave_1 entered promiscuous mode [ 71.904223][ T8096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.964884][ T8096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.048426][ T8136] chnl_net:caif_netlink_parms(): no params data found [ 72.169919][ T8096] team0: Port device team_slave_0 added [ 72.186725][ T8089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.240425][ T8096] team0: Port device team_slave_1 added [ 72.252451][ T8089] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.280693][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.289510][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.330261][ T8136] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.337987][ T8136] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.373976][ T8136] device bridge_slave_0 entered promiscuous mode [ 72.456063][ T8096] device hsr_slave_0 entered promiscuous mode [ 72.503614][ T8096] device hsr_slave_1 entered promiscuous mode [ 72.533277][ T8096] debugfs: Directory 'hsr0' with parent '/' already present! [ 72.540860][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.560289][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.589552][ T2864] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.596685][ T2864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.618384][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.637024][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.673766][ T2864] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.680833][ T2864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.714912][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.733793][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.763533][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.772276][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.797606][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.806975][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.816309][ T8136] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.835565][ T8136] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.847518][ T8136] device bridge_slave_1 entered promiscuous mode [ 72.871978][ T8089] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 72.897545][ T8089] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 72.948008][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.964120][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.972629][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 14:21:47 executing program 2: ptrace$peek(0x2, 0x0, &(0x7f0000000040)) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd1e}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600203f00000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000e2ffffffff00170000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020aa009070000000000030000b3480005001a00aea466aa000a00000000505193943c7f3cbecab5170000fe800a3f5b111a59050a00002000002465e38e4523731e3405003ee6e8d84cc21b35f78276f48cfa9072593c8e"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000008a, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) [ 73.004090][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.034858][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 73.045000][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.122306][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 73.149994][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 73.176438][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 73.232181][ T8089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.265621][ T8136] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.365286][ T8136] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.502126][ T8096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.516837][ T8250] ================================================================== [ 73.524974][ T8250] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 73.532505][ T8250] [ 73.534839][ T8250] write to 0xffff88812447e318 of 2 bytes by task 8258 on cpu 1: [ 73.542479][ T8250] pid_update_inode+0x51/0x70 [ 73.547166][ T8250] pid_revalidate+0x91/0xd0 [ 73.552596][ T8250] lookup_fast+0x618/0x700 [ 73.557023][ T8250] path_openat+0x2ac/0x36e0 [ 73.561531][ T8250] do_filp_open+0x11e/0x1b0 [ 73.566041][ T8250] do_sys_open+0x3b3/0x4f0 [ 73.570461][ T8250] __x64_sys_open+0x55/0x70 [ 73.574977][ T8250] do_syscall_64+0xcc/0x370 [ 73.579496][ T8250] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.585402][ T8250] [ 73.587739][ T8250] read to 0xffff88812447e318 of 2 bytes by task 8250 on cpu 0: [ 73.595463][ T8250] pid_update_inode+0x25/0x70 [ 73.600145][ T8250] pid_revalidate+0x91/0xd0 [ 73.604653][ T8250] lookup_fast+0x618/0x700 [ 73.609081][ T8250] path_openat+0x2ac/0x36e0 [ 73.613582][ T8250] do_filp_open+0x11e/0x1b0 [ 73.618094][ T8250] do_sys_open+0x3b3/0x4f0 [ 73.622530][ T8250] __x64_sys_open+0x55/0x70 [ 73.627042][ T8250] do_syscall_64+0xcc/0x370 [ 73.631563][ T8250] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.637450][ T8250] [ 73.639778][ T8250] Reported by Kernel Concurrency Sanitizer on: [ 73.645936][ T8250] CPU: 0 PID: 8250 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 73.652689][ T8250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.662744][ T8250] ================================================================== [ 73.670805][ T8250] Kernel panic - not syncing: panic_on_warn set ... [ 73.677407][ T8250] CPU: 0 PID: 8250 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 73.684173][ T8250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.694229][ T8250] Call Trace: [ 73.697539][ T8250] dump_stack+0xf5/0x159 [ 73.701799][ T8250] panic+0x210/0x640 [ 73.705716][ T8250] ? btrfs_log_inode+0x11a7/0x1d30 [ 73.710837][ T8250] ? vprintk_func+0x8d/0x140 [ 73.715471][ T8250] kcsan_report.cold+0xc/0xe [ 73.720087][ T8250] kcsan_setup_watchpoint+0x3fe/0x410 [ 73.725477][ T8250] __tsan_read2+0x145/0x1f0 [ 73.729997][ T8250] pid_update_inode+0x25/0x70 [ 73.734692][ T8250] pid_revalidate+0x91/0xd0 [ 73.739208][ T8250] lookup_fast+0x618/0x700 [ 73.743645][ T8250] path_openat+0x2ac/0x36e0 [ 73.748181][ T8250] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 73.754437][ T8250] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 73.760345][ T8250] ? __read_once_size+0x41/0xe0 [ 73.765215][ T8250] do_filp_open+0x11e/0x1b0 [ 73.769735][ T8250] ? __alloc_fd+0x2ef/0x3b0 [ 73.774253][ T8250] do_sys_open+0x3b3/0x4f0 [ 73.778687][ T8250] __x64_sys_open+0x55/0x70 [ 73.783158][ T8096] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.783235][ T8250] do_syscall_64+0xcc/0x370 [ 73.794739][ T8250] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.800630][ T8250] RIP: 0033:0x7f6dc949c120 [ 73.805061][ T8250] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 73.826500][ T8250] RSP: 002b:00007ffe367a91b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 73.834927][ T8250] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f6dc949c120 [ 73.842904][ T8250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f6dc996ad00 [ 73.850903][ T8250] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f6dc976457b [ 73.859425][ T8250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dc9969d00 [ 73.867486][ T8250] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 73.876990][ T8250] Kernel Offset: disabled [ 73.881320][ T8250] Rebooting in 86400 seconds..