[ 53.744895][ T26] audit: type=1800 audit(1573106281.906:24): pid=7883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2487 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.399490][ T26] audit: type=1800 audit(1573106282.656:25): pid=7883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 54.426387][ T26] audit: type=1800 audit(1573106282.656:26): pid=7883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 54.457523][ T26] audit: type=1800 audit(1573106282.656:27): pid=7883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 54.479469][ T26] audit: type=1800 audit(1573106282.656:28): pid=7883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 55.336036][ T26] audit: type=1800 audit(1573106283.586:29): pid=7883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 55.358216][ T26] audit: type=1800 audit(1573106283.586:30): pid=7883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.113' (ECDSA) to the list of known hosts. 2019/11/07 05:58:10 fuzzer started 2019/11/07 05:58:11 dialing manager at 10.128.0.105:34849 2019/11/07 05:58:17 syscalls: 2553 2019/11/07 05:58:17 code coverage: enabled 2019/11/07 05:58:17 comparison tracing: enabled 2019/11/07 05:58:17 extra coverage: extra coverage is not supported by the kernel 2019/11/07 05:58:17 setuid sandbox: enabled 2019/11/07 05:58:17 namespace sandbox: enabled 2019/11/07 05:58:17 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/07 05:58:17 fault injection: enabled 2019/11/07 05:58:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/07 05:58:17 net packet injection: enabled 2019/11/07 05:58:17 net device setup: enabled 2019/11/07 05:58:17 concurrency sanitizer: enabled 2019/11/07 05:58:17 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 72.425916][ T8048] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/07 05:58:28 adding functions to KCSAN blacklist: 'do_nanosleep' 'tick_nohz_idle_stop_tick' 'p9_poll_workfn' 'echo_char' '__dentry_kill' 'do_syslog' 'blk_stat_add' 'run_timer_softirq' 'pipe_poll' 'writeback_sb_inodes' 'ext4_nonda_switch' 'n_tty_receive_buf_common' '__hrtimer_run_queues' 'find_next_bit' 'poll_schedule_timeout' 'generic_fillattr' 'osq_lock' 'blk_mq_dispatch_rq_list' 'rcu_gp_fqs_check_wake' 'alloc_empty_file' 'pid_update_inode' 'process_srcu' 'ext4_free_inodes_count' 'taskstats_exit' 'task_dump_owner' '__alloc_file' 'ktime_get_real_seconds' 'ext4_has_free_clusters' 'netlink_recvmsg' 'pcpu_alloc' 'xas_find_marked' 'vm_area_dup' 'kauditd_thread' '__acct_update_integrals' '__ext4_new_inode' 'mm_update_next_owner' 'lruvec_lru_size' 'snapshot_refaults' 'ep_poll' 'blk_mq_get_request' 'blk_mq_free_request' 'generic_permission' 'ktime_get_seconds' '___sys_sendmsg' '__mark_inode_dirty' 'tick_sched_do_timer' 'xas_clear_mark' 'kvm_arch_vcpu_load' 'fsnotify' 'add_timer' 'tick_do_update_jiffies64' 'ext4_free_inode' 'dd_has_work' 'rcu_gp_fqs_loop' 'audit_log_start' 'queue_access_lock' 'blk_mq_run_hw_queue' 'mod_timer' 'page_counter_charge' 'inet_putpeer' 'tomoyo_supervisor' 'tcp_add_backlog' 'fasync_remove_entry' 'wbt_done' 'copy_process' 'generic_write_end' 'fanotify_handle_event' 'blk_mq_sched_dispatch_requests' 06:00:25 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, 0x0) fcntl$getflags(r2, 0x0) getpgid(0x0) r3 = geteuid() getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000780)) getresuid(0x0, 0x0, &(0x7f0000000840)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) lstat(0x0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0, 0x0}, &(0x7f0000000cc0)=0xc) fstat(0xffffffffffffffff, 0x0) getpgrp(0x0) getuid() getresuid(&(0x7f0000001700)=0x0, 0x0, &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001840)={0x0}, &(0x7f0000001880)=0xc) gettid() getgid() sendmmsg$unix(r2, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r5}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x58, 0x4000}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed9942ee14657bdf6224d8eb6b9958612d3cf0a4c4e3f10922e8c6de354421403c2d01b2b7e6fa53ffa7210c8d0b5bcaa7f376d26f49fcef2357b4d7be156eafb98ffd6f0db38d57d32b8525bbd22423e81886f0d97fa934f043fac129e444fe3f49a7e34c91ac4a36cdde22abd4d4a87072beb0b3", 0xb5}], 0x1, &(0x7f00000010c0), 0x0, 0x4000004}, {&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001580), 0x0, &(0x7f0000000a00)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00', @ANYRES32, @ANYRES32, @ANYBLOB="000000001400000000000000010000", @ANYRES32=r7, @ANYRES32, @ANYRES16=r6, @ANYBLOB], 0x3d, 0x44081}], 0x3, 0x20000000) getgroups(0x2, &(0x7f00000000c0)=[0x0, r4]) r8 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) close(r9) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r11, 0x200004) openat$dsp(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$cgroup_type(r8, &(0x7f0000000240)='threaded\x00', 0x9) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r9, r11, 0x0, 0x80001d00c0d0) 06:00:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\b\x80\x00\x00\x00\x00*', 0x8002}) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000040)={'eql\x00\x00\x00\xa9[\x00', @ifru_settings={0x85, 0x0, @fr=0x0}}) [ 197.744500][ T8052] IPVS: ftp: loaded support on port[0] = 21 [ 197.864175][ T8052] chnl_net:caif_netlink_parms(): no params data found [ 197.930375][ T8052] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.946402][ T8052] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.954279][ T8052] device bridge_slave_0 entered promiscuous mode [ 197.971657][ T8055] IPVS: ftp: loaded support on port[0] = 21 [ 197.979157][ T8052] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.986784][ T8052] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.000109][ T8052] device bridge_slave_1 entered promiscuous mode 06:00:26 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(0x0, r1, 0xf, r2, 0x1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x1ff) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r4, 0xc05c6104, &(0x7f0000000000)) creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x80000003) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x80000003) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), &(0x7f0000000680)=0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) acct(&(0x7f0000000180)='./file0\x00') [ 198.039049][ T8052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.060944][ T8052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.120158][ T8052] team0: Port device team_slave_0 added [ 198.127318][ T8052] team0: Port device team_slave_1 added [ 198.161979][ T8055] chnl_net:caif_netlink_parms(): no params data found [ 198.239524][ T8052] device hsr_slave_0 entered promiscuous mode [ 198.277320][ T8052] device hsr_slave_1 entered promiscuous mode 06:00:26 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = dup2(r0, 0xffffffffffffffff) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f00000002c0)={@null=' \x00', 0xf, 'bridge0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f00000000c0)) ptrace(0x10, r2) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000280)={0x0, 0x340}) [ 198.403428][ T8058] IPVS: ftp: loaded support on port[0] = 21 [ 198.518775][ T8052] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.525969][ T8052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.533328][ T8052] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.540476][ T8052] bridge0: port 1(bridge_slave_0) entered forwarding state 06:00:27 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e000000260005001900e0713c444d240c000000100003400a0001000300000037153e370900040002005001d1bd", 0x2e}], 0x7e}, 0x0) [ 198.701787][ T8055] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.726638][ T8055] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.734582][ T8055] device bridge_slave_0 entered promiscuous mode [ 198.864177][ T8055] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.886611][ T8055] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.894456][ T8055] device bridge_slave_1 entered promiscuous mode [ 198.947142][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.956543][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.015125][ T8055] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.097686][ T8055] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.102039][ T8086] IPVS: ftp: loaded support on port[0] = 21 [ 199.180726][ T8052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.214753][ T8055] team0: Port device team_slave_0 added [ 199.228372][ T8055] team0: Port device team_slave_1 added [ 199.358976][ T8088] IPVS: ftp: loaded support on port[0] = 21 [ 199.409593][ T8055] device hsr_slave_0 entered promiscuous mode [ 199.446614][ T8055] device hsr_slave_1 entered promiscuous mode [ 199.496362][ T8055] debugfs: Directory 'hsr0' with parent '/' already present! [ 199.511386][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.546890][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.584797][ T8052] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.661234][ T8058] chnl_net:caif_netlink_parms(): no params data found [ 199.727852][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.754704][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 06:00:28 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) accept4$tipc(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10, 0x800) geteuid() r1 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000d00)) getuid() getresgid(&(0x7f0000000000), &(0x7f0000000200), &(0x7f0000001680)) fstat(r0, 0x0) gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed9942ee14657bdf6224d8eb6b9958612d3cf0a4c4e3f10922e8c6de354421403c2d01b2b7e6fa53ffa7210c8d0b5bcaa7f376d26f49fcef2357b4d7be156eafb98ffd", 0x83}, {0x0}], 0x2, &(0x7f00000010c0), 0x0, 0x40044}, {0x0, 0x0, 0x0}], 0x3, 0x20000000) getgroups(0x3, &(0x7f00000000c0)=[0x0, 0xffffffffffffffff, 0x0]) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x125) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000140)={0x9c, 0x1000, 0x4, 0x39, 0x1f, 0x96}) ftruncate(r4, 0x200004) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r2, r4, 0x0, 0x80001d00c0d0) [ 199.811045][ T3008] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.818153][ T3008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.916903][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.968470][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.008127][ T3008] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.015269][ T3008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.088097][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.128722][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.185553][ T8052] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 200.276359][ T8052] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 200.429134][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.447322][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.456075][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.547040][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.556030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.617075][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.625824][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.687407][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.738730][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.775622][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.831425][ T8086] chnl_net:caif_netlink_parms(): no params data found [ 200.844916][ T8112] IPVS: ftp: loaded support on port[0] = 21 [ 200.945082][ T8058] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.957205][ T8058] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.997060][ T8058] device bridge_slave_0 entered promiscuous mode [ 201.026898][ T8058] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.033983][ T8058] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.057936][ T8058] device bridge_slave_1 entered promiscuous mode [ 201.114717][ T8055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.153707][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.176522][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.237119][ T8086] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.249039][ T8086] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.277056][ T8086] device bridge_slave_0 entered promiscuous mode [ 201.352269][ T8052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.362200][ T8058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.396617][ T8086] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.403680][ T8086] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.437194][ T8086] device bridge_slave_1 entered promiscuous mode [ 201.473873][ T8055] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.518645][ T8058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.557142][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.576855][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.673423][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.684249][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.718158][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.725248][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.746164][ T8131] ================================================================== [ 201.754385][ T8131] BUG: KCSAN: data-race in pipe_wait / put_pipe_info [ 201.761043][ T8131] [ 201.763378][ T8131] read to 0xffff8880b49b2c4c of 4 bytes by task 8099 on cpu 1: [ 201.770912][ T8131] pipe_wait+0xd7/0x140 [ 201.775058][ T8131] pipe_read+0x3b1/0x5e0 [ 201.779302][ T8131] new_sync_read+0x389/0x4f0 [ 201.783883][ T8131] __vfs_read+0xb1/0xc0 [ 201.788034][ T8131] vfs_read+0x143/0x2c0 [ 201.792190][ T8131] ksys_read+0xd5/0x1b0 [ 201.796338][ T8131] __x64_sys_read+0x4c/0x60 [ 201.800841][ T8131] do_syscall_64+0xcc/0x370 [ 201.805348][ T8131] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 201.811220][ T8131] [ 201.813547][ T8131] write to 0xffff8880b49b2c4c of 4 bytes by task 8131 on cpu 0: [ 201.821170][ T8131] put_pipe_info+0x4d/0xb0 [ 201.825577][ T8131] pipe_release+0x152/0x1b0 [ 201.830080][ T8131] __fput+0x1e1/0x520 [ 201.834052][ T8131] ____fput+0x1f/0x30 [ 201.838034][ T8131] task_work_run+0xf6/0x130 [ 201.842545][ T8131] exit_to_usermode_loop+0x2b4/0x2c0 [ 201.847825][ T8131] do_syscall_64+0x353/0x370 [ 201.852408][ T8131] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 201.858298][ T8131] [ 201.860617][ T8131] Reported by Kernel Concurrency Sanitizer on: [ 201.866773][ T8131] CPU: 0 PID: 8131 Comm: net.agent Not tainted 5.4.0-rc6+ #0 [ 201.874134][ T8131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.884181][ T8131] ================================================================== [ 201.892235][ T8131] Kernel panic - not syncing: panic_on_warn set ... [ 201.898831][ T8131] CPU: 0 PID: 8131 Comm: net.agent Not tainted 5.4.0-rc6+ #0 [ 201.906183][ T8131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.916324][ T8131] Call Trace: [ 201.919617][ T8131] dump_stack+0xf5/0x159 [ 201.923870][ T8131] panic+0x210/0x640 [ 201.927762][ T8131] ? vprintk_func+0x8d/0x140 [ 201.932523][ T8131] kcsan_report.cold+0xc/0xe [ 201.937111][ T8131] kcsan_setup_watchpoint+0x3fe/0x410 [ 201.942476][ T8131] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 201.948283][ T8131] __tsan_unaligned_write4+0x143/0x1f0 [ 201.953736][ T8131] put_pipe_info+0x4d/0xb0 [ 201.958152][ T8131] pipe_release+0x152/0x1b0 [ 201.962656][ T8131] __fput+0x1e1/0x520 [ 201.966634][ T8131] ? put_pipe_info+0xb0/0xb0 [ 201.971235][ T8131] ____fput+0x1f/0x30 [ 201.975210][ T8131] task_work_run+0xf6/0x130 [ 201.979728][ T8131] exit_to_usermode_loop+0x2b4/0x2c0 [ 201.985007][ T8131] ? __x64_sys_dup2+0x76/0x160 [ 201.989774][ T8131] do_syscall_64+0x353/0x370 [ 201.994451][ T8131] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 202.000367][ T8131] RIP: 0033:0x7fd25bf789b7 [ 202.004803][ T8131] Code: 73 01 c3 48 8b 0d 81 44 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 b8 21 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 51 44 2b 00 31 d2 48 29 c2 64 [ 202.024397][ T8131] RSP: 002b:00007fff947e9e78 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 202.032819][ T8131] RAX: 0000000000000001 RBX: 0000000000000001 RCX: 00007fd25bf789b7 [ 202.040783][ T8131] RDX: 00000000004022f2 RSI: 0000000000000001 RDI: 000000000000000a [ 202.048835][ T8131] RBP: 0000000000e15ae0 R08: 00007fff947e9ec0 R09: 0000000000000000 [ 202.056800][ T8131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 202.064772][ T8131] R13: 00007fff947ea0a0 R14: 0000000000000000 R15: 0000000000000000 [ 202.074468][ T8131] Kernel Offset: disabled [ 202.078909][ T8131] Rebooting in 86400 seconds..