[ 52.681998][ T25] audit: type=1800 audit(1572959835.298:27): pid=7994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 52.702555][ T25] audit: type=1800 audit(1572959835.298:28): pid=7994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.597872][ T25] audit: type=1800 audit(1572959836.288:29): pid=7994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 53.617971][ T25] audit: type=1800 audit(1572959836.288:30): pid=7994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.218' (ECDSA) to the list of known hosts. 2019/11/05 13:17:24 fuzzer started 2019/11/05 13:17:25 dialing manager at 10.128.0.105:39277 2019/11/05 13:17:29 syscalls: 2553 2019/11/05 13:17:29 code coverage: enabled 2019/11/05 13:17:29 comparison tracing: enabled 2019/11/05 13:17:29 extra coverage: extra coverage is not supported by the kernel 2019/11/05 13:17:29 setuid sandbox: enabled 2019/11/05 13:17:29 namespace sandbox: enabled 2019/11/05 13:17:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 13:17:29 fault injection: enabled 2019/11/05 13:17:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 13:17:29 net packet injection: enabled 2019/11/05 13:17:29 net device setup: enabled 2019/11/05 13:17:29 concurrency sanitizer: enabled 2019/11/05 13:17:29 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 71.064676][ T8163] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/05 13:17:37 adding functions to KCSAN blacklist: 'ep_poll' 'copy_process' '__skb_try_recv_from_queue' 'audit_log_start' 'taskstats_exit' 'tick_sched_do_timer' 'rcu_gp_fqs_loop' 'p9_poll_workfn' 'ext4_free_inode' 'enqueue_timer' 'inet_putpeer' 'run_timer_softirq' 'tomoyo_supervisor' 'timer_clear_idle' 'blk_mq_dispatch_rq_list' 'ktime_get_seconds' 'list_lru_count_one' 'snapshot_refaults' 'tick_nohz_idle_stop_tick' 'generic_fillattr' 'task_dump_owner' 'pipe_poll' 'generic_write_end' 'page_counter_try_charge' '__hrtimer_run_queues' 'do_nanosleep' 'poll_schedule_timeout' 'queue_access_lock' 'kauditd_thread' '__ext4_new_inode' 'vm_area_dup' 'blk_mq_sched_dispatch_requests' 'ep_insert' 'ktime_get_real_seconds' 'generic_permission' 'do_exit' 'dd_has_work' 'do_syslog' 'blk_mq_get_request' 'mem_cgroup_select_victim_node' 'atime_needs_update' 'n_tty_receive_buf_common' 'ext4_has_free_clusters' 'list_lru_add' 'xas_clear_mark' 'pid_update_inode' 'tick_do_update_jiffies64' 'rcu_gp_fqs_check_wake' 'tcp_add_backlog' 'ext4_nonda_switch' 'ext4_free_inodes_count' 'kvm_arch_vcpu_load' 'find_next_bit' 13:19:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x590, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x608) 13:19:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x8, 0x4) [ 166.437966][ T8165] IPVS: ftp: loaded support on port[0] = 21 [ 166.532530][ T8165] chnl_net:caif_netlink_parms(): no params data found [ 166.597294][ T8165] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.621196][ T8165] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.628951][ T8165] device bridge_slave_0 entered promiscuous mode [ 166.637456][ T8165] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.644658][ T8165] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.652823][ T8165] device bridge_slave_1 entered promiscuous mode [ 166.672171][ T8165] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.675241][ T8168] IPVS: ftp: loaded support on port[0] = 21 [ 166.684974][ T8165] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.710774][ T8165] team0: Port device team_slave_0 added [ 166.719403][ T8165] team0: Port device team_slave_1 added 13:19:09 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$bt_l2cap(r0, 0x0, 0x0) [ 166.804151][ T8165] device hsr_slave_0 entered promiscuous mode [ 166.841431][ T8165] device hsr_slave_1 entered promiscuous mode [ 167.029525][ T8165] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.036614][ T8165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.043981][ T8165] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.051205][ T8165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.100790][ T8170] IPVS: ftp: loaded support on port[0] = 21 [ 167.118703][ T8168] chnl_net:caif_netlink_parms(): no params data found [ 167.281647][ T8165] 8021q: adding VLAN 0 to HW filter on device bond0 13:19:10 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fanotify_init(0x0, 0x101000) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socket(0x0, 0x0, 0x0) semget$private(0x0, 0x2, 0x228) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0xb) [ 167.342256][ T8168] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.349563][ T8168] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.376108][ T8168] device bridge_slave_0 entered promiscuous mode [ 167.402780][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.452670][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.467350][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.504409][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 167.539351][ T8165] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.552187][ T8168] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.559331][ T8168] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.602191][ T8168] device bridge_slave_1 entered promiscuous mode [ 167.697739][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.712105][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.751413][ T2404] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.758564][ T2404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.811792][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.841676][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.881590][ T2404] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.888671][ T2404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.932753][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.962117][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.022117][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.030847][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.035130][ T8199] IPVS: ftp: loaded support on port[0] = 21 [ 168.072142][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.114841][ T8168] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 168.150405][ T8165] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 13:19:10 executing program 4: shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x0) [ 168.182552][ T8165] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 168.232480][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.271801][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.311952][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.343093][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.371931][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.402902][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.432675][ T8168] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.466343][ T8170] chnl_net:caif_netlink_parms(): no params data found [ 168.508830][ T8168] team0: Port device team_slave_0 added [ 168.562703][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.582189][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 168.601366][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 168.616131][ T8168] team0: Port device team_slave_1 added [ 168.675429][ T8165] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.760261][ T8202] IPVS: ftp: loaded support on port[0] = 21 [ 168.805242][ T8168] device hsr_slave_0 entered promiscuous mode 13:19:11 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, &(0x7f0000000140)) [ 168.851613][ T8168] device hsr_slave_1 entered promiscuous mode [ 168.923257][ T8168] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.933386][ T8170] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.940462][ T8170] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.948694][ T8170] device bridge_slave_0 entered promiscuous mode [ 168.986725][ T8170] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.994951][ T8170] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.005542][ T8170] device bridge_slave_1 entered promiscuous mode [ 169.045753][ T8214] IPVS: ftp: loaded support on port[0] = 21 [ 169.190719][ T8170] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.256539][ T8170] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.315422][ T8241] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 169.381694][ T8241] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 169.394691][ T8170] team0: Port device team_slave_0 added [ 169.412420][ T8199] chnl_net:caif_netlink_parms(): no params data found [ 169.472659][ T8170] team0: Port device team_slave_1 added 13:19:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x590, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x608) [ 169.514147][ T8168] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.536175][ T8202] chnl_net:caif_netlink_parms(): no params data found [ 169.642062][ T8168] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.665028][ T8246] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 169.703800][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.721690][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:19:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x590, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x608) [ 169.827240][ T8170] device hsr_slave_0 entered promiscuous mode [ 169.905360][ T8170] device hsr_slave_1 entered promiscuous mode [ 169.938779][ T8250] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 169.975072][ T8170] debugfs: Directory 'hsr0' with parent '/' already present! [ 170.001872][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.010804][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.043148][ T8195] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.050224][ T8195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.105022][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.121771][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.154403][ T8195] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.161737][ T8195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.195196][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.242565][ T8195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.280305][ T8202] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.290823][ T8202] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.310020][ T8202] device bridge_slave_0 entered promiscuous mode [ 170.329687][ T8202] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.352479][ T8202] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.382214][ T8202] device bridge_slave_1 entered promiscuous mode [ 170.439891][ T8168] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 13:19:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x590, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x608) [ 170.481169][ T8168] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.536124][ T8214] chnl_net:caif_netlink_parms(): no params data found [ 170.558902][ T8199] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.571451][ T8199] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.613052][ T8199] device bridge_slave_0 entered promiscuous mode [ 170.625016][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.645867][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.666768][ T8262] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 170.671897][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.712158][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.731852][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.752086][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.771831][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.801829][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.835133][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.865977][ T8202] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.908310][ T8199] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.921122][ T8199] bridge0: port 2(bridge_slave_1) entered disabled state 13:19:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x2000000000012, 0x2, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) set_mempolicy(0x2, &(0x7f00000000c0)=0x2, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f00000001c0)={0x8}) [ 170.951246][ T8199] device bridge_slave_1 entered promiscuous mode [ 171.039626][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.085752][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.117443][ T8202] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 13:19:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x2000000000012, 0x2, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) set_mempolicy(0x2, &(0x7f00000000c0)=0x2, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f00000001c0)={0x8}) [ 171.186210][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 171.193655][ T8276] ptrace attach of "/root/syz-executor.0"[8165] was attempted by " 0 p  p \x0d x?k4\x1b`yR4\x0c   \x0a  \x07     [ 171.204477][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 13:19:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x2000000000012, 0x2, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) set_mempolicy(0x2, &(0x7f00000000c0)=0x2, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f00000001c0)={0x8}) [ 171.444327][ T8290] ptrace attach of "/root/syz-executor.0"[8165] was attempted by " 0 p  p \x0d x?k4\x1b`yR4\x0c   \x0a  \x07     [ 171.483327][ T8199] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.728236][ C1] hrtimer: interrupt took 27276 ns [ 171.740909][ T8296] ptrace attach of "/root/syz-executor.0"[8165] was attempted by " 0 p  p \x0d x?k4\x1b`yR4\x0c   \x0a  \x07     [ 171.750086][ T8214] bridge0: port 1(bridge_slave_0) entered blocking state 13:19:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x2000000000012, 0x2, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) set_mempolicy(0x2, &(0x7f00000000c0)=0x2, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f00000001c0)={0x8}) [ 172.036033][ T8300] ptrace attach of "/root/syz-executor.0"[8165] was attempted by " 0 p  p \x0d x?k4\x1b`yR4\x0c   \x0a  \x07     [ 172.101739][ T8214] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.362501][ T8214] device bridge_slave_0 entered promiscuous mode [ 172.381978][ T8214] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.389070][ T8214] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.411841][ T8214] device bridge_slave_1 entered promiscuous mode [ 172.442587][ T8202] team0: Port device team_slave_0 added [ 172.449849][ T8199] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.462807][ T8168] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.518337][ T8202] team0: Port device team_slave_1 added [ 172.539996][ T8170] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.568975][ T8214] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.586432][ T8199] team0: Port device team_slave_0 added [ 172.607207][ T8170] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.617241][ T8214] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.647417][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.656483][ T2404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.717294][ T8266] ================================================================== [ 172.723600][ T8202] device hsr_slave_0 entered promiscuous mode [ 172.725446][ T8266] BUG: KCSAN: data-race in get_wchan / handle_mm_fault [ 172.738293][ T8266] [ 172.740649][ T8266] read to 0xffff8880b878d110 of 8 bytes by task 8291 on cpu 1: [ 172.748200][ T8266] get_wchan+0x47/0x180 [ 172.752369][ T8266] do_task_stat+0xdf0/0x1370 [ 172.756967][ T8266] proc_tgid_stat+0x3d/0x60 [ 172.761476][ T8266] proc_single_show+0x89/0xe0 [ 172.766157][ T8266] seq_read+0x350/0x960 [ 172.770310][ T8266] __vfs_read+0x67/0xc0 [ 172.774476][ T8266] vfs_read+0x143/0x2c0 [ 172.778647][ T8266] ksys_read+0xd5/0x1b0 [ 172.782904][ T8266] __x64_sys_read+0x4c/0x60 [ 172.787421][ T8266] do_syscall_64+0xcc/0x370 [ 172.791936][ T8266] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 172.797858][ T8266] [ 172.800200][ T8266] write to 0xffff8880b878d110 of 8 bytes by task 8266 on cpu 0: [ 172.807845][ T8266] handle_mm_fault+0x4a/0x530 [ 172.812537][ T8266] __do_page_fault+0x3fb/0x9e0 [ 172.817313][ T8266] do_page_fault+0x54/0x233 [ 172.821830][ T8266] page_fault+0x34/0x40 [ 172.825978][ T8266] [ 172.828306][ T8266] Reported by Kernel Concurrency Sanitizer on: [ 172.834512][ T8266] CPU: 0 PID: 8266 Comm: ifup Not tainted 5.4.0-rc6+ #0 [ 172.841425][ T8266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.852090][ T8266] ================================================================== [ 172.860176][ T8266] Kernel panic - not syncing: panic_on_warn set ... [ 172.866748][ T8266] CPU: 0 PID: 8266 Comm: ifup Not tainted 5.4.0-rc6+ #0 [ 172.873706][ T8266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.883750][ T8266] Call Trace: [ 172.887034][ T8266] dump_stack+0xf5/0x159 [ 172.891277][ T8266] panic+0x210/0x640 [ 172.895172][ T8266] ? vprintk_func+0x8d/0x140 [ 172.899841][ T8266] kcsan_report.cold+0xc/0xe [ 172.904418][ T8266] kcsan_setup_watchpoint+0x3fe/0x410 [ 172.909777][ T8266] __tsan_unaligned_write8+0x143/0x1f0 [ 172.915218][ T8266] handle_mm_fault+0x4a/0x530 [ 172.919886][ T8266] __do_page_fault+0x3fb/0x9e0 [ 172.924638][ T8266] do_page_fault+0x54/0x233 [ 172.929139][ T8266] ? do_syscall_64+0x270/0x370 [ 172.933890][ T8266] page_fault+0x34/0x40 [ 172.938025][ T8266] RIP: 0033:0x7ff5ffdd814f [ 172.943396][ T8266] Code: 01 48 89 df 0f 85 c9 00 00 00 40 f6 c7 02 0f 85 d7 00 00 00 40 f6 c7 04 0f 85 9d 00 00 00 89 d1 31 c0 c1 e9 03 f6 c2 04 89 c9 48 ab 75 5c f6 c2 02 75 3f 83 e2 01 75 32 48 8b 3d fb fd 20 00 [ 172.962991][ T8266] RSP: 002b:00007ffc8caa3ba0 EFLAGS: 00010246 [ 172.969035][ T8266] RAX: 0000000000000000 RBX: 00007ff5fffde700 RCX: 0000000000000120 [ 172.976998][ T8266] RDX: 0000000000000900 RSI: 0000000000001000 RDI: 00007ff5fffde700 [ 172.984951][ T8266] RBP: 00007ff5fffde000 R08: 00000000ffffffff R09: 0000000000000000 [ 172.992904][ T8266] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000000 [ 173.000858][ T8266] R13: 0000005e5cc54921 R14: 000000005cc54921 R15: 0000000000000000 [ 173.010177][ T8266] Kernel Offset: disabled [ 173.014507][ T8266] Rebooting in 86400 seconds..