[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 34.330300][ T26] audit: type=1800 audit(1572003550.344:25): pid=7070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 34.350000][ T26] audit: type=1800 audit(1572003550.344:26): pid=7070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 34.371731][ T26] audit: type=1800 audit(1572003550.344:27): pid=7070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.63' (ECDSA) to the list of known hosts. 2019/10/25 11:39:21 fuzzer started 2019/10/25 11:39:23 dialing manager at 10.128.0.105:33971 2019/10/25 11:39:23 syscalls: 2529 2019/10/25 11:39:23 code coverage: enabled 2019/10/25 11:39:23 comparison tracing: enabled 2019/10/25 11:39:23 extra coverage: extra coverage is not supported by the kernel 2019/10/25 11:39:23 setuid sandbox: enabled 2019/10/25 11:39:23 namespace sandbox: enabled 2019/10/25 11:39:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/25 11:39:23 fault injection: enabled 2019/10/25 11:39:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/25 11:39:23 net packet injection: enabled 2019/10/25 11:39:23 net device setup: enabled 2019/10/25 11:39:23 concurrency sanitizer: enabled 2019/10/25 11:39:25 adding functions to KCSAN blacklist: 'tcp_add_backlog' 'ext4_setattr' 'generic_permission' 'find_next_bit' 'tomoyo_supervisor' 'run_timer_softirq' 'ext4_free_inodes_count' 'pipe_poll' '__hrtimer_run_queues' '__tcp_select_window' 'echo_char' 'generic_write_end' 'ktime_get_real_seconds' 11:39:28 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x3f00, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="580000000000000014010000070000000300000004000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\b'], @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB="0200000000000000"], @ANYBLOB="010000000000000005000000000000000800000000000000050000000000000070000000000000000200000000000000"], 0x58}, 0x0) fcntl$getflags(0xffffffffffffffff, 0x40a) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="4100008b", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) syzkaller login: [ 52.946613][ T7237] IPVS: ftp: loaded support on port[0] = 21 11:39:29 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @empty}}, 0x0, 0x6, 0x0, "aa6950035b33888ba3eb46d88e503df9a1c959e9e2b850dcdbd5f8fb2648bdac293876227e0a878412fa992319abb7d66505e9f98678fbeb414805ca670cf506a016bd31ed1f34e1c6ff0ea7bd1e00"}, 0xd8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x11f) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000200)=0x5, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 53.039429][ T7237] chnl_net:caif_netlink_parms(): no params data found [ 53.112868][ T7237] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.135487][ T7237] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.143430][ T7237] device bridge_slave_0 entered promiscuous mode [ 53.166275][ T7237] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.173439][ T7237] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.181477][ T7237] device bridge_slave_1 entered promiscuous mode [ 53.202648][ T7237] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.213244][ T7237] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.257219][ T7237] team0: Port device team_slave_0 added [ 53.264148][ T7237] team0: Port device team_slave_1 added 11:39:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) readv(r0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000e80)=[{&(0x7f0000000c40)="f20116e0bfa0b22d93b4b0038ac4410109a3d1937e36a6fed7d8ac02a9e750db8dd244e78ba2043f0394f7bf445b7be53ac62b0fd3b0603512b0c44544bde2d9e6f970b928e8202f27f60a24917e660322bfd61b617ca872144bf821dbacaba0ddac4994268b71d71ae136ec42891f35337cc38a276a9c4d313b446d523e", 0x7e}, {&(0x7f0000000800)}, {&(0x7f0000000600)="b0cc855158c67dcbc5cbb951adabe12662f561acc5c67507", 0x18}], 0x3, 0x2) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x12, 0x0) recvfrom$x25(r1, 0x0, 0x0, 0xc0010100, &(0x7f0000000300)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet(0x2, 0x0, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@remote}, {0x0, 0x0, 0x9}}, {{@in6=@loopback}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0xfffffffe}}, 0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000780)={0x0, 0xfffffffffffffff9, 0x0, 0x6, @scatter={0x1, 0x0, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/227, 0xe3}]}, 0x0, 0x0, 0xffff, 0x3e, 0x2, &(0x7f00000005c0)}) r3 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) r5 = socket(0x10, 0x20001000000003, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)=0x0) ioctl$VIDIOC_STREAMOFF(r3, 0x40045613, &(0x7f0000000f00)=0x10000) syz_open_dev$cec(&(0x7f0000000b40)='/dev/cec#\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000a80)={0x0, 0x70, 0x0, 0x0, 0x5, 0x3, 0x0, 0x9, 0x100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xda22, 0x4, @perf_bp={&(0x7f0000000a40), 0x8}, 0x200, 0x18, 0x0, 0x5, 0x7, 0x7f, 0x1f}, r6, 0x10, 0xffffffffffffffff, 0x2) write(r5, &(0x7f00000000c0)="220000001400070000e80000000003000208030001000000080002004100fff0f055", 0x22) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000001c0)={'hwsim0\x00', {0x2, 0x0, @rand_addr=0x1}}) socket(0x10, 0x20001000000003, 0x0) write$cgroup_pid(r4, &(0x7f0000000640), 0x12) [ 53.301097][ T7240] IPVS: ftp: loaded support on port[0] = 21 [ 53.338179][ T7237] device hsr_slave_0 entered promiscuous mode [ 53.386111][ T7237] device hsr_slave_1 entered promiscuous mode [ 53.576492][ T7237] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.583595][ T7237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.591016][ T7237] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.598163][ T7237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.763050][ T7237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.793737][ T7252] IPVS: ftp: loaded support on port[0] = 21 [ 53.843971][ T7237] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.879892][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.889163][ T3500] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.945871][ T3500] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.996458][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 11:39:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'lo\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) [ 54.060110][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.075957][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.083118][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.135734][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.175390][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.182461][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.244399][ T7240] chnl_net:caif_netlink_parms(): no params data found [ 54.290743][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.306418][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.345335][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.354583][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.406211][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.435889][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.444643][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.496355][ T7237] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.526384][ T7237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.563334][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.572236][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.585722][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.613200][ T7271] IPVS: ftp: loaded support on port[0] = 21 [ 54.642889][ T7237] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.791868][ T7240] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.805020][ T7240] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.813114][ T7240] device bridge_slave_0 entered promiscuous mode [ 54.886475][ T7240] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.893672][ T7240] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.925989][ T7240] device bridge_slave_1 entered promiscuous mode [ 55.003811][ T7240] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.054158][ T7240] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 11:39:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x152ed, 0x0, 0x0) [ 55.122659][ T7240] team0: Port device team_slave_0 added [ 55.196256][ T7252] chnl_net:caif_netlink_parms(): no params data found [ 55.228470][ T7240] team0: Port device team_slave_1 added [ 55.410384][ T7240] device hsr_slave_0 entered promiscuous mode [ 55.433897][ T7282] atomic_op 0000000018c46f51 conn xmit_atomic 00000000acdfdc13 [ 55.467676][ T7240] device hsr_slave_1 entered promiscuous mode [ 55.475644][ C1] hrtimer: interrupt took 34468 ns [ 55.495181][ T7282] atomic_op 00000000b2172e01 conn xmit_atomic 00000000acdfdc13 [ 55.507387][ T7240] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.581752][ T7252] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.635087][ T7252] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.643150][ T7252] device bridge_slave_0 entered promiscuous mode [ 55.732380][ T7252] bridge0: port 2(bridge_slave_1) entered blocking state 11:39:31 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x3f00, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="580000000000000014010000070000000300000004000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\b'], @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB="0200000000000000"], @ANYBLOB="010000000000000005000000000000000800000000000000050000000000000070000000000000000200000000000000"], 0x58}, 0x0) fcntl$getflags(0xffffffffffffffff, 0x40a) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="4100008b", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) [ 55.795162][ T7252] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.855723][ T7252] device bridge_slave_1 entered promiscuous mode [ 55.901145][ T7271] chnl_net:caif_netlink_parms(): no params data found [ 56.018441][ T7309] atomic_op 000000009499aa9a conn xmit_atomic 00000000acdfdc13 [ 56.063568][ T7287] IPVS: ftp: loaded support on port[0] = 21 11:39:32 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x3f00, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="580000000000000014010000070000000300000004000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\b'], @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB="0200000000000000"], @ANYBLOB="010000000000000005000000000000000800000000000000050000000000000070000000000000000200000000000000"], 0x58}, 0x0) fcntl$getflags(0xffffffffffffffff, 0x40a) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="4100008b", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) [ 56.187447][ T7252] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.239644][ T7252] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.360995][ T7252] team0: Port device team_slave_0 added [ 56.374840][ T7324] atomic_op 00000000cb9f6f18 conn xmit_atomic 00000000acdfdc13 [ 56.416780][ T7271] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.453457][ T7271] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.485979][ T7271] device bridge_slave_0 entered promiscuous mode [ 56.510783][ T7271] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.558111][ T7271] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.585049][ T7271] device bridge_slave_1 entered promiscuous mode [ 56.642587][ T7252] team0: Port device team_slave_1 added [ 56.661419][ T7240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.732313][ T7240] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.798234][ T7252] device hsr_slave_0 entered promiscuous mode [ 56.845326][ T7252] device hsr_slave_1 entered promiscuous mode [ 56.875203][ T7252] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.887742][ T7271] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.917351][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.948927][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.959567][ T7318] ================================================================== [ 56.967659][ T7318] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 56.975189][ T7318] [ 56.977514][ T7318] write to 0xffff88812409bd58 of 2 bytes by task 7320 on cpu 1: [ 56.985138][ T7318] pid_update_inode+0x51/0x70 [ 56.989813][ T7318] pid_revalidate+0x91/0xd0 [ 56.994315][ T7318] lookup_fast+0x6f2/0x700 [ 56.998837][ T7318] walk_component+0x6d/0xe80 [ 57.003423][ T7318] link_path_walk.part.0+0x5d3/0xa90 [ 57.008711][ T7318] path_openat+0x14f/0x36e0 [ 57.013205][ T7318] do_filp_open+0x11e/0x1b0 [ 57.017102][ T7240] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 57.017702][ T7318] do_sys_open+0x3b3/0x4f0 [ 57.017726][ T7318] __x64_sys_open+0x55/0x70 [ 57.036920][ T7318] do_syscall_64+0xcc/0x370 [ 57.041426][ T7318] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 57.047300][ T7318] [ 57.049626][ T7318] read to 0xffff88812409bd58 of 2 bytes by task 7318 on cpu 0: [ 57.055097][ T7240] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 57.057167][ T7318] pid_update_inode+0x44/0x70 [ 57.072120][ T7318] pid_revalidate+0x91/0xd0 [ 57.076615][ T7318] lookup_fast+0x6f2/0x700 [ 57.081017][ T7318] walk_component+0x6d/0xe80 [ 57.085599][ T7318] link_path_walk.part.0+0x5d3/0xa90 [ 57.090877][ T7318] path_openat+0x14f/0x36e0 [ 57.095370][ T7318] do_filp_open+0x11e/0x1b0 [ 57.099865][ T7318] do_sys_open+0x3b3/0x4f0 [ 57.104274][ T7318] __x64_sys_open+0x55/0x70 [ 57.108857][ T7318] do_syscall_64+0xcc/0x370 [ 57.113349][ T7318] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 57.119219][ T7318] [ 57.121535][ T7318] Reported by Kernel Concurrency Sanitizer on: [ 57.127678][ T7318] CPU: 0 PID: 7318 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 57.134427][ T7318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.144469][ T7318] ================================================================== [ 57.148831][ T7240] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.152593][ T7318] Kernel panic - not syncing: panic_on_warn set ... [ 57.165904][ T7318] CPU: 0 PID: 7318 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 57.172649][ T7318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.182703][ T7318] Call Trace: [ 57.185994][ T7318] dump_stack+0xf5/0x159 [ 57.190234][ T7318] panic+0x210/0x640 [ 57.194125][ T7318] ? __x64_sys_open+0x55/0x70 [ 57.198799][ T7318] ? vprintk_func+0x8d/0x140 [ 57.203386][ T7318] kcsan_report.cold+0xc/0x10 [ 57.208057][ T7318] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 57.213592][ T7318] ? task_dump_owner+0xf7/0x260 [ 57.218440][ T7318] __tsan_read2+0x2c/0x30 [ 57.222772][ T7318] pid_update_inode+0x44/0x70 [ 57.227436][ T7318] pid_revalidate+0x91/0xd0 [ 57.231939][ T7318] lookup_fast+0x6f2/0x700 [ 57.236359][ T7318] walk_component+0x6d/0xe80 [ 57.240938][ T7318] ? __tsan_read8+0x2c/0x30 [ 57.245435][ T7318] ? security_inode_permission+0xa5/0xc0 [ 57.251069][ T7318] link_path_walk.part.0+0x5d3/0xa90 [ 57.256368][ T7318] path_openat+0x14f/0x36e0 [ 57.260872][ T7318] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 57.266503][ T7318] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 57.272128][ T7318] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 57.277755][ T7318] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 57.283381][ T7318] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 57.289007][ T7318] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 57.294631][ T7318] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 57.300259][ T7318] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 57.305887][ T7318] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 57.311770][ T7318] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 57.317402][ T7318] do_filp_open+0x11e/0x1b0 [ 57.321904][ T7318] ? __alloc_fd+0x316/0x4c0 [ 57.326408][ T7318] do_sys_open+0x3b3/0x4f0 [ 57.330818][ T7318] __x64_sys_open+0x55/0x70 [ 57.335323][ T7318] do_syscall_64+0xcc/0x370 [ 57.339821][ T7318] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 57.345701][ T7318] RIP: 0033:0x7f43fede9120 [ 57.350113][ T7318] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 57.369714][ T7318] RSP: 002b:00007ffd41e24138 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 57.378122][ T7318] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f43fede9120 [ 57.386083][ T7318] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f43ff2b7d00 [ 57.394046][ T7318] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f43ff0b157b [ 57.402016][ T7318] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43ff2b6d00 [ 57.409983][ T7318] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 57.419201][ T7318] Kernel Offset: disabled [ 57.423556][ T7318] Rebooting in 86400 seconds..