[info] Using makefile-style concurrent boot in runlevel 2. [ 42.442969][ T26] audit: type=1800 audit(1576015302.864:21): pid=7495 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.500395][ T26] audit: type=1800 audit(1576015302.864:22): pid=7495 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.12' (ECDSA) to the list of known hosts. 2019/12/10 22:01:54 fuzzer started 2019/12/10 22:01:56 dialing manager at 10.128.0.105:37821 2019/12/10 22:02:00 syscalls: 2689 2019/12/10 22:02:00 code coverage: enabled 2019/12/10 22:02:00 comparison tracing: enabled 2019/12/10 22:02:00 extra coverage: extra coverage is not supported by the kernel 2019/12/10 22:02:00 setuid sandbox: enabled 2019/12/10 22:02:00 namespace sandbox: enabled 2019/12/10 22:02:00 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/10 22:02:00 fault injection: enabled 2019/12/10 22:02:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/10 22:02:00 net packet injection: enabled 2019/12/10 22:02:00 net device setup: enabled 2019/12/10 22:02:00 concurrency sanitizer: enabled 2019/12/10 22:02:00 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 63.934883][ T7667] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/10 22:02:06 adding functions to KCSAN blacklist: 'do_syslog' 'run_timer_softirq' 'xas_clear_mark' 'pcpu_alloc' 'tick_sched_do_timer' 'ext4_free_inodes_count' 'tomoyo_supervisor' 'vm_area_dup' 'tick_do_update_jiffies64' 'dd_has_work' 'icmp_global_allow' 'find_next_bit' 'ep_poll' 'mm_update_next_owner' 'ext4_nonda_switch' 'kauditd_thread' 'generic_write_end' 'add_timer' 'echo_char' 'ktime_get_seconds' 'mod_timer' 'taskstats_exit' 'ext4_free_inode' 'tcp_add_backlog' 'pipe_poll' 'rcu_gp_fqs_check_wake' 'poll_schedule_timeout' 'ktime_get_real_seconds' '__ext4_new_inode' 'do_signal_stop' 'blk_mq_get_request' 'pipe_wait' '__snd_rawmidi_transmit_ack' 'lruvec_lru_size' 'bio_endio' 'ext4_has_free_clusters' '__hrtimer_run_queues' 'find_get_pages_range_tag' 'tick_nohz_idle_stop_tick' 'generic_fillattr' 'audit_log_start' 'blk_mq_dispatch_rq_list' 22:02:50 executing program 0: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) [ 110.581466][ T7669] IPVS: ftp: loaded support on port[0] = 21 22:02:51 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f00000007c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x80605414, &(0x7f0000000100)) [ 110.658299][ T7669] chnl_net:caif_netlink_parms(): no params data found [ 110.717322][ T7669] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.724449][ T7669] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.747028][ T7669] device bridge_slave_0 entered promiscuous mode [ 110.754284][ T7669] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.776535][ T7669] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.784591][ T7669] device bridge_slave_1 entered promiscuous mode [ 110.801835][ T7669] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 110.812494][ T7669] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:02:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_DEFAULT_PVID={0x8, 0x27, 0x1}]}}}]}, 0x3c}}, 0x0) [ 110.831874][ T7672] IPVS: ftp: loaded support on port[0] = 21 [ 110.852998][ T7669] team0: Port device team_slave_0 added [ 110.869126][ T7669] team0: Port device team_slave_1 added [ 111.008343][ T7669] device hsr_slave_0 entered promiscuous mode 22:02:51 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 111.056764][ T7669] device hsr_slave_1 entered promiscuous mode [ 111.214938][ T7674] IPVS: ftp: loaded support on port[0] = 21 [ 111.280032][ T7669] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.287157][ T7669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.294411][ T7669] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.301460][ T7669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.433932][ T7691] IPVS: ftp: loaded support on port[0] = 21 [ 111.548733][ T7672] chnl_net:caif_netlink_parms(): no params data found [ 111.685472][ T7669] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.723633][ T17] bridge0: port 1(bridge_slave_0) entered disabled state 22:02:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000d00)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 111.737918][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.768427][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 111.843736][ T7672] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.856504][ T7672] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.864218][ T7672] device bridge_slave_0 entered promiscuous mode [ 111.936703][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.947977][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.977232][ T7672] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.984289][ T7672] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.027210][ T7672] device bridge_slave_1 entered promiscuous mode [ 112.073909][ T7674] chnl_net:caif_netlink_parms(): no params data found [ 112.105916][ T7691] chnl_net:caif_netlink_parms(): no params data found [ 112.161577][ T7669] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.222699][ T7672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 112.266004][ T7706] IPVS: ftp: loaded support on port[0] = 21 [ 112.267109][ T7674] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.306599][ T7674] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.314490][ T7674] device bridge_slave_0 entered promiscuous mode [ 112.354124][ T7672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 112.406868][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.426959][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.458561][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.465675][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.498827][ T7691] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.505882][ T7691] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.547324][ T7691] device bridge_slave_0 entered promiscuous mode [ 112.566842][ T7674] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.573906][ T7674] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.609516][ T7674] device bridge_slave_1 entered promiscuous mode [ 112.648486][ T7672] team0: Port device team_slave_0 added 22:02:53 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() r2 = getegid() mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) chown(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x3) [ 112.654238][ T7691] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.664314][ T7691] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.693006][ T7691] device bridge_slave_1 entered promiscuous mode [ 112.715527][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.736667][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.753558][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.760643][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.780798][ T7672] team0: Port device team_slave_1 added [ 112.811166][ T7674] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 112.841285][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.852799][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.862693][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.871625][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 112.880558][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 112.888973][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.897892][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.906308][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.914760][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 112.925840][ T7674] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 112.941754][ T7691] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 112.952892][ T7691] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 112.976196][ T7691] team0: Port device team_slave_0 added [ 112.989277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.997777][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.007992][ T7669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 113.058245][ T7672] device hsr_slave_0 entered promiscuous mode [ 113.096835][ T7672] device hsr_slave_1 entered promiscuous mode [ 113.136646][ T7672] debugfs: Directory 'hsr0' with parent '/' already present! [ 113.150175][ T7691] team0: Port device team_slave_1 added [ 113.156618][ T7674] team0: Port device team_slave_0 added [ 113.157395][ T7717] IPVS: ftp: loaded support on port[0] = 21 [ 113.170207][ T7674] team0: Port device team_slave_1 added [ 113.258719][ T7691] device hsr_slave_0 entered promiscuous mode [ 113.308487][ T7691] device hsr_slave_1 entered promiscuous mode [ 113.338693][ T7691] debugfs: Directory 'hsr0' with parent '/' already present! [ 113.428874][ T7674] device hsr_slave_0 entered promiscuous mode [ 113.457059][ T7674] device hsr_slave_1 entered promiscuous mode [ 113.506524][ T7674] debugfs: Directory 'hsr0' with parent '/' already present! [ 113.517043][ T7669] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 113.530798][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 113.555043][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 113.622541][ T7706] chnl_net:caif_netlink_parms(): no params data found [ 113.976699][ T7706] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.985676][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.079638][ T7706] device bridge_slave_0 entered promiscuous mode [ 114.165644][ T7672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 114.247578][ T7691] 8021q: adding VLAN 0 to HW filter on device bond0 [ 114.258262][ T7706] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.265399][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.337604][ T7706] device bridge_slave_1 entered promiscuous mode [ 114.415154][ T7672] 8021q: adding VLAN 0 to HW filter on device team0 [ 114.479075][ T7717] chnl_net:caif_netlink_parms(): no params data found [ 114.505864][ T7674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 114.578598][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.599592][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.673500][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.740611][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.808415][ T7706] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 114.854497][ T7691] 8021q: adding VLAN 0 to HW filter on device team0 22:02:55 executing program 0: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) [ 114.905486][ T7674] 8021q: adding VLAN 0 to HW filter on device team0 [ 114.950025][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.977271][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.054200][ T7701] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.061280][ T7701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.170494][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.236982][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.246136][ T7701] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.253215][ T7701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.429650][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 115.490397][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 115.557546][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 115.607136][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 115.667290][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.704436][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.748307][ T7706] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 115.819867][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.828370][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 115.849469][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 22:02:56 executing program 0: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) [ 115.887144][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 115.895684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.996930][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.005479][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.012518][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.137354][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 116.146096][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.255463][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.262567][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.319754][ T7788] ================================================================== [ 116.327876][ T7788] BUG: KCSAN: data-race in common_perm_cond / task_dump_owner [ 116.335315][ T7788] [ 116.337644][ T7788] read to 0xffff888128b1a2ec of 4 bytes by task 7773 on cpu 0: [ 116.345182][ T7788] common_perm_cond+0x65/0x110 [ 116.346995][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 116.349941][ T7788] apparmor_inode_getattr+0x2b/0x40 [ 116.362986][ T7788] security_inode_getattr+0x9b/0xd0 [ 116.368180][ T7788] vfs_getattr+0x2e/0x70 [ 116.372424][ T7788] vfs_statx+0x102/0x190 [ 116.376683][ T7788] __do_sys_newstat+0x51/0xb0 [ 116.381356][ T7788] __x64_sys_newstat+0x3a/0x50 [ 116.386129][ T7788] do_syscall_64+0xcc/0x370 [ 116.390641][ T7788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.396516][ T7788] [ 116.398845][ T7788] write to 0xffff888128b1a2ec of 4 bytes by task 7788 on cpu 1: [ 116.406478][ T7788] task_dump_owner+0x237/0x260 [ 116.411240][ T7788] pid_update_inode+0x3c/0x70 [ 116.415908][ T7788] pid_revalidate+0x91/0xd0 [ 116.417471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 116.420414][ T7788] lookup_fast+0x6f2/0x700 [ 116.432872][ T7788] walk_component+0x6d/0xe70 [ 116.437466][ T7788] link_path_walk.part.0+0x5d3/0xa90 [ 116.442745][ T7788] path_openat+0x14f/0x36e0 [ 116.447243][ T7788] do_filp_open+0x11e/0x1b0 [ 116.451825][ T7788] do_sys_open+0x3b3/0x4f0 [ 116.456258][ T7788] __x64_sys_open+0x55/0x70 [ 116.460754][ T7788] do_syscall_64+0xcc/0x370 [ 116.465265][ T7788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.471135][ T7788] [ 116.473450][ T7788] Reported by Kernel Concurrency Sanitizer on: [ 116.479604][ T7788] CPU: 1 PID: 7788 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 116.486787][ T7788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.496833][ T7788] ================================================================== [ 116.497484][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 116.504880][ T7788] Kernel panic - not syncing: panic_on_warn set ... [ 116.504895][ T7788] CPU: 1 PID: 7788 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 116.504903][ T7788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.504907][ T7788] Call Trace: [ 116.504930][ T7788] dump_stack+0x11d/0x181 [ 116.504954][ T7788] panic+0x210/0x640 [ 116.548043][ T7788] ? vprintk_func+0x8d/0x140 [ 116.553073][ T7788] kcsan_report.cold+0xc/0xd [ 116.557667][ T7788] kcsan_setup_watchpoint+0x3fe/0x460 [ 116.563039][ T7788] __tsan_unaligned_write4+0xc4/0x100 [ 116.568401][ T7788] task_dump_owner+0x237/0x260 [ 116.573183][ T7788] ? __rcu_read_unlock+0x66/0x3c0 [ 116.578212][ T7788] pid_update_inode+0x3c/0x70 [ 116.582890][ T7788] pid_revalidate+0x91/0xd0 [ 116.587394][ T7788] lookup_fast+0x6f2/0x700 [ 116.591822][ T7788] walk_component+0x6d/0xe70 [ 116.596418][ T7788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.602666][ T7788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.607607][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 116.609070][ T7788] ? security_inode_permission+0xa5/0xc0 [ 116.622489][ T7788] ? inode_permission+0xa0/0x3c0 [ 116.627426][ T7788] link_path_walk.part.0+0x5d3/0xa90 [ 116.632724][ T7788] path_openat+0x14f/0x36e0 [ 116.637233][ T7788] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 116.643121][ T7788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.649357][ T7788] ? __rcu_read_unlock+0x66/0x3c0 [ 116.654375][ T7788] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 116.660266][ T7788] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 116.666155][ T7788] ? __read_once_size+0x41/0xe0 [ 116.667954][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 116.671005][ T7788] do_filp_open+0x11e/0x1b0 [ 116.671062][ T7788] ? __alloc_fd+0x2ef/0x3b0 [ 116.687908][ T7788] do_sys_open+0x3b3/0x4f0 [ 116.692331][ T7788] __x64_sys_open+0x55/0x70 [ 116.696830][ T7788] do_syscall_64+0xcc/0x370 [ 116.701330][ T7788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.707216][ T7788] RIP: 0033:0x7f98c965c120 [ 116.711634][ T7788] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 116.731228][ T7788] RSP: 002b:00007ffcca97c978 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 116.737378][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 116.739637][ T7788] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f98c965c120 [ 116.756353][ T7788] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f98c9b2ad00 [ 116.764323][ T7788] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f98c9924a10 [ 116.772289][ T7788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f98c9b29d00 [ 116.780253][ T7788] R13: 00000000021c31c0 R14: 0000000000000005 R15: 0000000000000000 [ 116.789511][ T7788] Kernel Offset: disabled [ 116.793837][ T7788] Rebooting in 86400 seconds..