[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 34.753133][ T25] audit: type=1800 audit(1572869340.353:25): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 34.788030][ T25] audit: type=1800 audit(1572869340.353:26): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 34.822184][ T25] audit: type=1800 audit(1572869340.353:27): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.133' (ECDSA) to the list of known hosts. 2019/11/04 12:09:12 fuzzer started 2019/11/04 12:09:14 dialing manager at 10.128.0.105:43623 2019/11/04 12:09:14 syscalls: 2553 2019/11/04 12:09:14 code coverage: enabled 2019/11/04 12:09:14 comparison tracing: enabled 2019/11/04 12:09:14 extra coverage: extra coverage is not supported by the kernel 2019/11/04 12:09:14 setuid sandbox: enabled 2019/11/04 12:09:14 namespace sandbox: enabled 2019/11/04 12:09:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 12:09:14 fault injection: enabled 2019/11/04 12:09:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 12:09:14 net packet injection: enabled 2019/11/04 12:09:14 net device setup: enabled 2019/11/04 12:09:14 concurrency sanitizer: enabled 2019/11/04 12:09:14 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/04 12:09:19 adding functions to KCSAN blacklist: '__tcp_select_window' 'tcp_poll' '__nf_conntrack_find_get' 'tomoyo_supervisor' 'ext4_has_free_clusters' 'pid_update_inode' '__nf_ct_refresh_acct' 'rcu_gp_fqs_check_wake' 'tcp_add_backlog' '__hrtimer_run_queues' 'find_next_bit' 'ep_poll' 'ktime_get_real_seconds' 'taskstats_exit' 'tick_do_update_jiffies64' 'pipe_poll' 'generic_fillattr' 'add_timer' 'generic_permission' 12:09:22 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:09:22 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfea2, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) syzkaller login: [ 57.244429][ T7280] IPVS: ftp: loaded support on port[0] = 21 [ 57.367724][ T7280] chnl_net:caif_netlink_parms(): no params data found [ 57.407870][ T7280] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.415826][ T7280] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.424493][ T7280] device bridge_slave_0 entered promiscuous mode [ 57.432157][ T7280] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.440505][ T7280] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.449008][ T7280] device bridge_slave_1 entered promiscuous mode [ 57.471925][ T7280] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.484221][ T7280] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.526004][ T7280] team0: Port device team_slave_0 added [ 57.534781][ T7280] team0: Port device team_slave_1 added [ 57.547526][ T7283] IPVS: ftp: loaded support on port[0] = 21 12:09:23 executing program 2: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e29", 0x90, r0) request_key(&(0x7f0000000980)='dns_resolver\x00', &(0x7f0000000840)={'\x00\x97\xdf', 0x3}, &(0x7f0000000880)='./cgroup.net/syz1\x00', r0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000300)='\xff\x03\x00\x00\x11\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000800)={0xa, 0x200, 0x0, @remote, 0x4}, 0x1c) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000180)={0x3, 0x0, 0x101, 0x1, {0x4, 0x0, 0x80000000, 0x3}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x18, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f0000000940)='?dev/a5\xc8\xb3x\xac\xeb\v#R\xb8\x9a\xa2', 0x200000, 0x261801) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f00000004c0)={&(0x7f00000009c0)={0x14, 0xb3, 0x8, 0x70bd2c, 0x0, {0x55}}, 0x14}, 0x1, 0x0, 0x0, 0x4048024}, 0x4000000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000007c0)=ANY=[@ANYBLOB="00140001ea8d00a1fe31afc86720040800"], 0x12) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) fsmount(r7, 0x1, 0x56280bfed87abe90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000200)={'gretap0\x00', {0x2, 0x0, @loopback}}) write(0xffffffffffffffff, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026", 0xf) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @empty, @local}, &(0x7f00000003c0)=0xc) sendto$packet(0xffffffffffffffff, &(0x7f0000000240)="8c6afbc18295209d3afd2fdfa79f0b5dff7fa7f9745afe84b0e3064767e50f60a2d6b11d85967d31afaed05441e3605647bc0e7e209596824ddcf166c92999088280229a0ff4f172a00ccb4ac0965ad1e16ce1b3731291c1342e6b7a84285c2ce01ff376432225b320daa46f2fe7785c581f", 0x72, 0x4000, &(0x7f0000000400)={0x11, 0x8, r9, 0x1, 0xfe, 0x6, @random="2e17d5349ce9"}, 0x14) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r5, r5, 0x0, 0x40fdf) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) [ 57.635965][ T7280] device hsr_slave_0 entered promiscuous mode [ 57.693167][ T7280] device hsr_slave_1 entered promiscuous mode [ 57.845163][ T7280] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.852472][ T7280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.859872][ T7280] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.867033][ T7280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.132077][ T7299] IPVS: ftp: loaded support on port[0] = 21 [ 58.145372][ T7280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.205345][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.233501][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.263888][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.313999][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 58.359576][ T7280] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.387367][ T7283] chnl_net:caif_netlink_parms(): no params data found [ 58.415075][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.433938][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.464181][ T7310] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.471258][ T7310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.560816][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.572590][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.595038][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.602133][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.643551][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.663990][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.704241][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.735619][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.745262][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.784091][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.820821][ T7280] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 58.854589][ T7280] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.897837][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.907198][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.943586][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.975423][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.003871][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.051665][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.068102][ T7283] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.094642][ T7283] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.103470][ T7283] device bridge_slave_0 entered promiscuous mode [ 59.127583][ T7280] 8021q: adding VLAN 0 to HW filter on device batadv0 12:09:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x40000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) alarm(0x0) dup3(r0, r1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$notify(r2, 0x402, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xba, 0x0, 0x0, "01ff075dc2a482fc0a332cae0d3b2712558774937c4533707a77b245c1b4f9cfcb1785b6ad82d5399b988110362a556c9dfdbad24233ec51e5f4a0fa6e4f24ef5159532b92611e4df64f2ee6b6912e857f770637608b6200401e33867ecb6e8226d9d2e8979e09ee35b47252ef070a15f1457eb357ee9f3e9ae3e2982c754920742acab964e5ce220dc1d5559244bf38f464e9d9d2f0f9bf514c1333de9ed39f6abe1d504cdb8119b3df2580939efca75ebf4fb98d11b2b2ffda"}) [ 59.144562][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 59.152011][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.187220][ T7283] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.201441][ T7283] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.243779][ T7283] device bridge_slave_1 entered promiscuous mode [ 59.355402][ T7283] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.419552][ T7299] chnl_net:caif_netlink_parms(): no params data found [ 59.447286][ T7283] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.637964][ T7283] team0: Port device team_slave_0 added [ 59.652207][ T7283] team0: Port device team_slave_1 added [ 59.697119][ T7299] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.709042][ T7299] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.742678][ T7299] device bridge_slave_0 entered promiscuous mode [ 59.802705][ T7299] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.810014][ T7299] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.842720][ T7299] device bridge_slave_1 entered promiscuous mode 12:09:25 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 59.870752][ T7322] IPVS: ftp: loaded support on port[0] = 21 12:09:25 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 59.975936][ T7283] device hsr_slave_0 entered promiscuous mode [ 60.025605][ T7283] device hsr_slave_1 entered promiscuous mode [ 60.083387][ T7283] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.124440][ T7299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.144527][ T7299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 12:09:25 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 60.240285][ T7299] team0: Port device team_slave_0 added [ 60.333894][ T7299] team0: Port device team_slave_1 added [ 60.419263][ T7337] IPVS: ftp: loaded support on port[0] = 21 12:09:26 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 60.544757][ T7283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.575875][ T7299] device hsr_slave_0 entered promiscuous mode [ 60.623201][ T7299] device hsr_slave_1 entered promiscuous mode [ 60.658477][ T7299] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.883721][ T7283] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.919608][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.942128][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.015543][ T7322] chnl_net:caif_netlink_parms(): no params data found 12:09:26 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:09:26 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5c454c06005b05007311"], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff40) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 61.292992][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.301891][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.369970][ T7310] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.377144][ T7310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.438892][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.506627][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.574081][ T7310] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.581194][ T7310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.654631][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.714135][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.766952][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.826747][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.867463][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.933759][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.993798][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.053584][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.086686][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.100333][ T7389] ================================================================== [ 62.108448][ T7389] BUG: KCSAN: data-race in task_dump_owner / task_dump_owner [ 62.115803][ T7389] [ 62.118130][ T7389] write to 0xffff888123c83840 of 4 bytes by task 7387 on cpu 0: [ 62.125759][ T7389] task_dump_owner+0x246/0x260 [ 62.130538][ T7389] pid_update_inode+0x3c/0x70 [ 62.135209][ T7389] pid_revalidate+0x91/0xd0 [ 62.139706][ T7389] lookup_fast+0x6f2/0x700 [ 62.144116][ T7389] walk_component+0x6d/0xe80 [ 62.148702][ T7389] path_lookupat.isra.0+0x13a/0x5a0 [ 62.153899][ T7389] filename_lookup+0x145/0x2b0 [ 62.160310][ T7389] user_path_at_empty+0x4c/0x70 [ 62.165157][ T7389] vfs_statx+0xd9/0x190 [ 62.169308][ T7389] __do_sys_newstat+0x51/0xb0 [ 62.173977][ T7389] __x64_sys_newstat+0x3a/0x50 [ 62.178747][ T7389] do_syscall_64+0xcc/0x370 [ 62.183246][ T7389] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 62.189123][ T7389] [ 62.191453][ T7389] write to 0xffff888123c83840 of 4 bytes by task 7389 on cpu 1: [ 62.199087][ T7389] task_dump_owner+0x246/0x260 [ 62.203852][ T7389] pid_update_inode+0x3c/0x70 [ 62.208536][ T7389] pid_revalidate+0x91/0xd0 [ 62.213037][ T7389] lookup_fast+0x6f2/0x700 [ 62.217455][ T7389] walk_component+0x6d/0xe80 [ 62.222052][ T7389] link_path_walk.part.0+0x5d3/0xa90 [ 62.227335][ T7389] path_openat+0x14f/0x36e0 [ 62.231839][ T7389] do_filp_open+0x11e/0x1b0 [ 62.236338][ T7389] do_sys_open+0x3b3/0x4f0 [ 62.240750][ T7389] __x64_sys_open+0x55/0x70 [ 62.245255][ T7389] do_syscall_64+0xcc/0x370 [ 62.249757][ T7389] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 62.255640][ T7389] [ 62.257957][ T7389] Reported by Kernel Concurrency Sanitizer on: [ 62.264110][ T7389] CPU: 1 PID: 7389 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 62.270860][ T7389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.280913][ T7389] ================================================================== [ 62.288973][ T7389] Kernel panic - not syncing: panic_on_warn set ... [ 62.295558][ T7389] CPU: 1 PID: 7389 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 62.302307][ T7389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.312962][ T7389] Call Trace: [ 62.316258][ T7389] dump_stack+0xf5/0x159 [ 62.320499][ T7389] panic+0x210/0x640 [ 62.324386][ T7389] ? do_sys_open+0x3b3/0x4f0 [ 62.328969][ T7389] ? vprintk_func+0x8d/0x140 [ 62.333643][ T7389] kcsan_report.cold+0xc/0x10 [ 62.338322][ T7389] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 62.343871][ T7389] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 62.349505][ T7389] __tsan_write4+0x32/0x40 [ 62.353928][ T7389] task_dump_owner+0x246/0x260 [ 62.358690][ T7389] ? __rcu_read_unlock+0x66/0x3c0 [ 62.363747][ T7389] pid_update_inode+0x3c/0x70 [ 62.368423][ T7389] pid_revalidate+0x91/0xd0 [ 62.372926][ T7389] lookup_fast+0x6f2/0x700 [ 62.377782][ T7389] walk_component+0x6d/0xe80 [ 62.382380][ T7389] ? __tsan_read8+0x2c/0x30 [ 62.386885][ T7389] ? security_inode_permission+0xa5/0xc0 [ 62.392597][ T7389] link_path_walk.part.0+0x5d3/0xa90 [ 62.397891][ T7389] path_openat+0x14f/0x36e0 [ 62.402484][ T7389] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 62.408114][ T7389] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 62.413744][ T7389] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 62.419375][ T7389] ? __tsan_write4+0x32/0x40 [ 62.423966][ T7389] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 62.429596][ T7389] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 62.435485][ T7389] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 62.441116][ T7389] do_filp_open+0x11e/0x1b0 [ 62.445628][ T7389] ? __alloc_fd+0x316/0x4c0 [ 62.450134][ T7389] do_sys_open+0x3b3/0x4f0 [ 62.454553][ T7389] __x64_sys_open+0x55/0x70 [ 62.459059][ T7389] do_syscall_64+0xcc/0x370 [ 62.463562][ T7389] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 62.469447][ T7389] RIP: 0033:0x7f1b7a9fd120 [ 62.473864][ T7389] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 62.493461][ T7389] RSP: 002b:00007ffd13a02a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 62.501961][ T7389] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f1b7a9fd120 [ 62.509924][ T7389] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f1b7aecbd00 [ 62.517903][ T7389] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f1b7acc5a10 [ 62.525885][ T7389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1b7aecad00 [ 62.533854][ T7389] R13: 0000000000f9b1c0 R14: 0000000000000005 R15: 0000000000000000 [ 62.542570][ T7389] Kernel Offset: disabled [ 62.546891][ T7389] Rebooting in 86400 seconds..