[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.331617][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 52.331632][ T26] audit: type=1800 audit(1575951072.906:29): pid=7469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 52.362980][ T26] audit: type=1800 audit(1575951072.906:30): pid=7469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.60' (ECDSA) to the list of known hosts. 2019/12/10 04:11:22 fuzzer started 2019/12/10 04:11:24 dialing manager at 10.128.0.105:43773 2019/12/10 04:11:24 syscalls: 2689 2019/12/10 04:11:24 code coverage: enabled 2019/12/10 04:11:24 comparison tracing: enabled 2019/12/10 04:11:24 extra coverage: extra coverage is not supported by the kernel 2019/12/10 04:11:24 setuid sandbox: enabled 2019/12/10 04:11:24 namespace sandbox: enabled 2019/12/10 04:11:24 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/10 04:11:24 fault injection: enabled 2019/12/10 04:11:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/10 04:11:24 net packet injection: enabled 2019/12/10 04:11:24 net device setup: enabled 2019/12/10 04:11:24 concurrency sanitizer: enabled 2019/12/10 04:11:24 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 65.083139][ T7635] KCSAN: could not find function: 'may_open' 2019/12/10 04:11:27 adding functions to KCSAN blacklist: 'ext4_nonda_switch' 'tick_do_update_jiffies64' 'run_timer_softirq' '__hrtimer_run_queues' 'blk_mq_get_request' 'generic_fillattr' 'may_open' 'find_next_bit' '__splice_from_pipe' 'ep_poll' 'find_get_pages_range_tag' '__delete_from_page_cache' 'blk_mq_dispatch_rq_list' 'tcp_add_backlog' 'taskstats_exit' 'wbt_done' 'do_nanosleep' 'rcu_gp_fqs_check_wake' 'tomoyo_supervisor' 04:11:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904024865161a000100050000740089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) 04:11:34 executing program 1: rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r0 = memfd_create(&(0x7f000088f000)='\x00\x00\x00', 0x4) ftruncate(r0, 0x20000000) [ 73.583972][ T7638] IPVS: ftp: loaded support on port[0] = 21 [ 73.683397][ T7638] chnl_net:caif_netlink_parms(): no params data found [ 73.712610][ T7638] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.719784][ T7638] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.728785][ T7638] device bridge_slave_0 entered promiscuous mode [ 73.736177][ T7638] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.743730][ T7638] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.752643][ T7638] device bridge_slave_1 entered promiscuous mode [ 73.763990][ T7641] IPVS: ftp: loaded support on port[0] = 21 [ 73.771603][ T7638] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 04:11:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e21, @rand_addr=0xfffffc01}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000580)=@sack_info={r1, 0xfffffffc, 0x81}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x8, 0x2, [0x0, 0x5]}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) [ 73.783875][ T7638] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.819719][ T7638] team0: Port device team_slave_0 added [ 73.826327][ T7638] team0: Port device team_slave_1 added [ 73.890282][ T7638] device hsr_slave_0 entered promiscuous mode [ 73.938734][ T7638] device hsr_slave_1 entered promiscuous mode [ 74.023436][ T7643] IPVS: ftp: loaded support on port[0] = 21 [ 74.055329][ T7638] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.062440][ T7638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.069716][ T7638] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.076774][ T7638] bridge0: port 1(bridge_slave_0) entered forwarding state 04:11:34 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="5500000018007f5800fe01b2a4a280930a06000015290dcd30aeda5e3900090008000c00010000001900150006000000000000dc1338d54400009b84136ef75afb83de06000000000000007f8d621a4559e65517b3", 0xdf4d}], 0x1}, 0x0) [ 74.177133][ T7641] chnl_net:caif_netlink_parms(): no params data found [ 74.362547][ T7638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.403887][ T7641] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.417725][ T7641] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.425460][ T7641] device bridge_slave_0 entered promiscuous mode [ 74.463631][ T7638] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.494291][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.508493][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.528906][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.558823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 74.580501][ T7641] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.587648][ T7641] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.605539][ T7641] device bridge_slave_1 entered promiscuous mode [ 74.642287][ T7643] chnl_net:caif_netlink_parms(): no params data found [ 74.759222][ T7643] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.766521][ T7643] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.818438][ T7643] device bridge_slave_0 entered promiscuous mode [ 74.849748][ T7643] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.856999][ T7643] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.890022][ T7643] device bridge_slave_1 entered promiscuous mode [ 74.918028][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.927043][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.968082][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.975320][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.008293][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:11:35 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x7, 0x5, 0x0, 0x0, 0xa}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 75.017255][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.068268][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.075690][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.118167][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 75.190224][ T7641] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.210351][ T7672] IPVS: ftp: loaded support on port[0] = 21 [ 75.221526][ T7638] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 75.267768][ T7638] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 75.329524][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.339532][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.368684][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.402503][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.440198][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.461905][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.488573][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.508391][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.519956][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.541790][ T7643] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.573423][ T7643] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.594447][ T7641] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.624574][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 75.648920][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 75.668036][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 75.675464][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 75.689018][ T7641] team0: Port device team_slave_0 added 04:11:36 executing program 5: io_submit(0x0, 0xffffffffffffff60, 0x0) [ 75.716267][ T7638] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.729434][ T7674] IPVS: ftp: loaded support on port[0] = 21 [ 75.737111][ T7641] team0: Port device team_slave_1 added [ 75.746426][ T7643] team0: Port device team_slave_0 added [ 75.780290][ T7643] team0: Port device team_slave_1 added [ 75.840105][ T7641] device hsr_slave_0 entered promiscuous mode [ 75.908092][ T7641] device hsr_slave_1 entered promiscuous mode [ 75.967794][ T7641] debugfs: Directory 'hsr0' with parent '/' already present! [ 76.049799][ T7643] device hsr_slave_0 entered promiscuous mode [ 76.078057][ T7643] device hsr_slave_1 entered promiscuous mode [ 76.117853][ T7643] debugfs: Directory 'hsr0' with parent '/' already present! [ 76.132361][ T7688] IPVS: ftp: loaded support on port[0] = 21 [ 76.297982][ T7707] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 76.366864][ T7643] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.375151][ T7707] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:11:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904024865161a000100050000740089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) [ 76.565015][ T7674] chnl_net:caif_netlink_parms(): no params data found [ 76.604240][ T7643] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.639971][ T7743] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 76.676470][ T7641] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.700216][ T7743] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 76.720040][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.738233][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.791381][ T7672] chnl_net:caif_netlink_parms(): no params data found [ 76.856010][ T7641] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.887556][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 04:11:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904024865161a000100050000740089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) [ 76.920359][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.978142][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.985376][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.051173][ T7749] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 77.058278][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.091512][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.127300][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.134495][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.144715][ T7749] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 77.226575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 04:11:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904024865161a000100050000740089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) [ 77.270901][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.336338][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.387710][ T7753] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 77.398499][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.416736][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.449672][ T7753] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 77.468249][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.482360][ T7643] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 77.547739][ T7643] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 04:11:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904024865161a000100050000740089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) [ 77.666058][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.680255][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.749913][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.767754][ T7756] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 77.808444][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.868429][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.907727][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.921530][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 04:11:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904024865161a000100050000740089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) [ 77.978328][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.018939][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.068280][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.128247][ T2933] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.137205][ T2933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.167783][ T7760] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 78.228211][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.288067][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.297362][ T2933] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.304576][ T2933] bridge0: port 2(bridge_slave_1) entered forwarding state 04:11:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904024865161a000100050000740089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) [ 78.400081][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.459232][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.508741][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.569331][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.628574][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.688235][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 04:11:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="e0686f200256314b7f09cba79dd67af3eeb26115b90cb651d9fe3a28865e46aee3ac7cd16161646a67fee49849fcf78e6ecdf265fb809ffc92e0fa15b6691a9bd228031c754c1cb0745d8a26ed9e2271c56e2cb20d57eb0b81bc4283682833fa2a5cff55f9b89d42d086729f9337f0633403b49f0ced2212bd4ebc4266370dd8ca"], 0x81) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) socket$kcm(0x2b, 0x1, 0x0) [ 78.791087][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.821536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.880783][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 78.928478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.980235][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.020363][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.052646][ C1] hrtimer: interrupt took 25937 ns [ 79.068325][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.146235][ T7641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 79.172187][ T7643] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.220939][ T7674] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.243120][ T7674] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.288397][ T7674] device bridge_slave_0 entered promiscuous mode [ 79.360147][ T7688] chnl_net:caif_netlink_parms(): no params data found [ 79.390184][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.402583][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.447235][ T7641] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.462686][ T7672] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.489317][ T7672] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.511556][ T7672] device bridge_slave_0 entered promiscuous mode [ 79.526794][ T7674] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.535873][ T7674] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.544532][ T7674] device bridge_slave_1 entered promiscuous mode [ 79.563818][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.572831][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.581329][ T7672] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.588944][ T7672] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.597070][ T7672] device bridge_slave_1 entered promiscuous mode [ 79.612798][ T7674] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.629265][ T7674] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.647485][ T7672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.663161][ T7672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.693113][ T7674] team0: Port device team_slave_0 added [ 79.701246][ T7674] team0: Port device team_slave_1 added [ 79.739564][ T7672] team0: Port device team_slave_0 added [ 79.754848][ T7688] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.772245][ T7688] bridge0: port 1(bridge_slave_0) entered disabled state 04:11:40 executing program 1: rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r0 = memfd_create(&(0x7f000088f000)='\x00\x00\x00', 0x4) ftruncate(r0, 0x20000000) [ 79.799301][ T7688] device bridge_slave_0 entered promiscuous mode [ 79.810387][ T7672] team0: Port device team_slave_1 added [ 79.819223][ T7688] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.826886][ T7688] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.839093][ T7688] device bridge_slave_1 entered promiscuous mode [ 79.892324][ T7674] device hsr_slave_0 entered promiscuous mode [ 79.971423][ T7674] device hsr_slave_1 entered promiscuous mode 04:11:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e21, @rand_addr=0xfffffc01}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000580)=@sack_info={r1, 0xfffffffc, 0x81}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x8, 0x2, [0x0, 0x5]}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) [ 80.037730][ T7674] debugfs: Directory 'hsr0' with parent '/' already present! [ 80.169950][ T7672] device hsr_slave_0 entered promiscuous mode [ 80.218215][ T7672] device hsr_slave_1 entered promiscuous mode [ 80.257725][ T7672] debugfs: Directory 'hsr0' with parent '/' already present! [ 80.271619][ T7688] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.339099][ T7688] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.472363][ T7688] team0: Port device team_slave_0 added [ 80.505419][ T7688] team0: Port device team_slave_1 added [ 80.527387][ T7834] ================================================================== [ 80.535549][ T7834] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 80.543092][ T7834] [ 80.545434][ T7834] read to 0xffff8881254f0ac8 of 2 bytes by task 7829 on cpu 0: [ 80.552985][ T7834] pid_update_inode+0x25/0x70 [ 80.557664][ T7834] pid_revalidate+0x91/0xd0 [ 80.562187][ T7834] lookup_fast+0x6f2/0x700 [ 80.566608][ T7834] walk_component+0x6d/0xe70 [ 80.571203][ T7834] path_lookupat.isra.0+0x13a/0x5a0 [ 80.576840][ T7834] filename_lookup+0x145/0x2b0 [ 80.581960][ T7834] user_path_at_empty+0x4c/0x70 [ 80.586858][ T7834] vfs_statx+0xd9/0x190 [ 80.591103][ T7834] __do_sys_newstat+0x51/0xb0 [ 80.595782][ T7834] __x64_sys_newstat+0x3a/0x50 [ 80.600565][ T7834] do_syscall_64+0xcc/0x370 [ 80.605073][ T7834] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.610951][ T7834] [ 80.613284][ T7834] write to 0xffff8881254f0ac8 of 2 bytes by task 7834 on cpu 1: [ 80.620927][ T7834] pid_update_inode+0x51/0x70 [ 80.625682][ T7834] pid_revalidate+0x91/0xd0 [ 80.630970][ T7834] lookup_fast+0x6f2/0x700 [ 80.636520][ T7834] walk_component+0x6d/0xe70 [ 80.641158][ T7834] link_path_walk.part.0+0x5d3/0xa90 [ 80.646452][ T7834] path_openat+0x14f/0x36e0 [ 80.651392][ T7834] do_filp_open+0x11e/0x1b0 [ 80.655901][ T7834] do_sys_open+0x3b3/0x4f0 [ 80.660756][ T7834] __x64_sys_open+0x55/0x70 [ 80.666246][ T7834] do_syscall_64+0xcc/0x370 [ 80.670756][ T7834] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.676631][ T7834] [ 80.678959][ T7834] Reported by Kernel Concurrency Sanitizer on: [ 80.685110][ T7834] CPU: 1 PID: 7834 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 80.692309][ T7834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.703229][ T7834] ================================================================== [ 80.711549][ T7834] Kernel panic - not syncing: panic_on_warn set ... [ 80.718227][ T7834] CPU: 1 PID: 7834 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 80.725418][ T7834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.735460][ T7834] Call Trace: [ 80.738752][ T7834] dump_stack+0x11d/0x181 [ 80.743088][ T7834] panic+0x210/0x640 [ 80.746989][ T7834] ? vprintk_func+0x8d/0x140 [ 80.751585][ T7834] kcsan_report.cold+0xc/0xd [ 80.756179][ T7834] kcsan_setup_watchpoint+0x3fe/0x460 [ 80.761559][ T7834] __tsan_unaligned_write2+0xc4/0x100 [ 80.766939][ T7834] pid_update_inode+0x51/0x70 [ 80.771629][ T7834] pid_revalidate+0x91/0xd0 [ 80.776138][ T7834] lookup_fast+0x6f2/0x700 [ 80.780710][ T7834] walk_component+0x6d/0xe70 [ 80.785330][ T7834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.791588][ T7834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.797834][ T7834] ? security_inode_permission+0xa5/0xc0 [ 80.803475][ T7834] ? inode_permission+0xa0/0x3c0 [ 80.808413][ T7834] link_path_walk.part.0+0x5d3/0xa90 [ 80.813698][ T7834] path_openat+0x14f/0x36e0 [ 80.818228][ T7834] ? proc_pid_status+0xee1/0x1000 [ 80.823259][ T7834] ? __read_once_size.constprop.0+0x12/0x20 [ 80.829151][ T7834] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 80.835399][ T7834] ? __virt_addr_valid+0x126/0x190 [ 80.840504][ T7834] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 80.846767][ T7834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.853014][ T7834] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 80.858904][ T7834] ? __read_once_size+0x41/0xe0 [ 80.863758][ T7834] do_filp_open+0x11e/0x1b0 [ 80.868264][ T7834] ? __alloc_fd+0x2ef/0x3b0 [ 80.872778][ T7834] do_sys_open+0x3b3/0x4f0 [ 80.877204][ T7834] __x64_sys_open+0x55/0x70 [ 80.881716][ T7834] do_syscall_64+0xcc/0x370 [ 80.886222][ T7834] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.892104][ T7834] RIP: 0033:0x7fbcd7206120 [ 80.896522][ T7834] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 80.916124][ T7834] RSP: 002b:00007fff0c9d36a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 80.924533][ T7834] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fbcd7206120 [ 80.932500][ T7834] RDX: 00007fff0c9d36e2 RSI: 0000000000000000 RDI: 00007fff0c9d36d0 [ 80.940473][ T7834] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007fbcd74ce55f [ 80.948441][ T7834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001dd3220 [ 80.956409][ T7834] R13: 0000000000000020 R14: 00007fbcd78bb010 R15: 0000000000000000 [ 80.965863][ T7834] Kernel Offset: disabled [ 80.970258][ T7834] Rebooting in 86400 seconds..