[   35.812414][   T26] audit: type=1800 audit(1572004142.076:24): pid=7200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2487 res=0
[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[   36.346930][   T26] audit: type=1800 audit(1572004142.686:25): pid=7200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0
[   36.380276][   T26] audit: type=1800 audit(1572004142.686:26): pid=7200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.15.193' (ECDSA) to the list of known hosts.
2019/10/25 11:49:14 fuzzer started
2019/10/25 11:49:16 dialing manager at 10.128.0.105:33971
2019/10/25 11:49:17 syscalls: 2529
2019/10/25 11:49:17 code coverage: enabled
2019/10/25 11:49:17 comparison tracing: enabled
2019/10/25 11:49:17 extra coverage: extra coverage is not supported by the kernel
2019/10/25 11:49:17 setuid sandbox: enabled
2019/10/25 11:49:17 namespace sandbox: enabled
2019/10/25 11:49:17 Android sandbox: /sys/fs/selinux/policy does not exist
2019/10/25 11:49:17 fault injection: enabled
2019/10/25 11:49:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/10/25 11:49:17 net packet injection: enabled
2019/10/25 11:49:17 net device setup: enabled
2019/10/25 11:49:17 concurrency sanitizer: enabled
2019/10/25 11:49:21 adding functions to KCSAN blacklist: 'tick_sched_do_timer' '__hrtimer_run_queues' '__tcp_select_window' 'generic_write_end' 'pid_update_inode' 'ep_poll' 'tcp_poll' 'taskstats_exit' 'generic_fillattr' 'find_next_bit' 'tomoyo_supervisor' 'rcu_gp_fqs_check_wake' '__ext4_new_inode' 'echo_char' 'ktime_get_real_seconds' 'pipe_poll' 'mod_timer' 'blk_mq_dispatch_rq_list' 'generic_permission' 'run_timer_softirq' 'ext4_free_inodes_count' 'tcp_add_backlog' 'ext4_setattr' '__nf_ct_refresh_acct' 'tick_do_update_jiffies64' 
11:49:30 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = socket$l2tp(0x18, 0x1, 0x1)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0)

11:49:30 executing program 1:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0xa, 0x1, 0x0)
close(r0)
r1 = socket$inet6(0xa, 0x100000000802, 0x0)
setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000340)="ff020400"/24, 0x18)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="35d4a7cf18000000629841c900"}, 0x1c)
sendmmsg$inet_sctp(r0, &(0x7f0000000100), 0xa0, 0x0)

syzkaller login: [   64.206242][ T7367] IPVS: ftp: loaded support on port[0] = 21
[   64.351024][ T7369] IPVS: ftp: loaded support on port[0] = 21
[   64.395270][ T7367] chnl_net:caif_netlink_parms(): no params data found
[   64.474919][ T7367] bridge0: port 1(bridge_slave_0) entered blocking state
[   64.483813][ T7367] bridge0: port 1(bridge_slave_0) entered disabled state
[   64.492666][ T7367] device bridge_slave_0 entered promiscuous mode
[   64.511806][ T7367] bridge0: port 2(bridge_slave_1) entered blocking state
11:49:30 executing program 2:
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0)

[   64.519929][ T7367] bridge0: port 2(bridge_slave_1) entered disabled state
[   64.529104][ T7367] device bridge_slave_1 entered promiscuous mode
[   64.622106][ T7367] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   64.634829][ T7369] chnl_net:caif_netlink_parms(): no params data found
[   64.647695][ T7367] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   64.704045][ T7367] team0: Port device team_slave_0 added
[   64.711455][ T7367] team0: Port device team_slave_1 added
[   64.717408][ T7369] bridge0: port 1(bridge_slave_0) entered blocking state
[   64.726986][ T7369] bridge0: port 1(bridge_slave_0) entered disabled state
[   64.735457][ T7369] device bridge_slave_0 entered promiscuous mode
[   64.769556][ T7369] bridge0: port 2(bridge_slave_1) entered blocking state
[   64.776662][ T7369] bridge0: port 2(bridge_slave_1) entered disabled state
[   64.787202][ T7369] device bridge_slave_1 entered promiscuous mode
11:49:31 executing program 3:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x2000)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340))
connect$inet6(r1, 0x0, 0xffffffffffffff56)
recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_open_pts(0xffffffffffffffff, 0x0)
io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/17, 0x11}], 0x1)
io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0)
socket$inet6(0xa, 0x801, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000003c0)=0x6, 0x4)
write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf)
shutdown(r2, 0x1)
socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0)

[   65.002872][ T7367] device hsr_slave_0 entered promiscuous mode
11:49:31 executing program 4:
r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0)
r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0)
write(r0, &(0x7f0000000600)="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", 0x200)
perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xde, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
sendfile(r0, r1, 0x0, 0x10003)

[   65.158364][ T7367] device hsr_slave_1 entered promiscuous mode
[   65.236013][ T7375] IPVS: ftp: loaded support on port[0] = 21
[   65.250195][ T7373] IPVS: ftp: loaded support on port[0] = 21
[   65.271083][ T7369] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   65.354350][ T7369] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   65.437565][ T7377] IPVS: ftp: loaded support on port[0] = 21
[   65.500384][ T7369] team0: Port device team_slave_0 added
[   65.506712][ T7367] bridge0: port 2(bridge_slave_1) entered blocking state
[   65.513885][ T7367] bridge0: port 2(bridge_slave_1) entered forwarding state
[   65.521314][ T7367] bridge0: port 1(bridge_slave_0) entered blocking state
[   65.528428][ T7367] bridge0: port 1(bridge_slave_0) entered forwarding state
[   65.588256][ T1062] bridge0: port 1(bridge_slave_0) entered disabled state
[   65.619591][ T1062] bridge0: port 2(bridge_slave_1) entered disabled state
[   65.663914][ T7369] team0: Port device team_slave_1 added
11:49:32 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00739fe780a082d3d293fb9ccb59491f"], 0x50}}, 0x0)

[   65.883149][ T7369] device hsr_slave_0 entered promiscuous mode
[   65.940135][ T7369] device hsr_slave_1 entered promiscuous mode
[   65.960859][ T7369] debugfs: Directory 'hsr0' with parent '/' already present!
[   66.065684][ T7367] 8021q: adding VLAN 0 to HW filter on device bond0
[   66.202301][ T7367] 8021q: adding VLAN 0 to HW filter on device team0
[   66.247050][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   66.270135][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   66.346393][ T7375] chnl_net:caif_netlink_parms(): no params data found
[   66.384748][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   66.410461][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   66.469959][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[   66.477114][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[   66.570625][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   66.618980][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   66.658565][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[   66.665663][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[   66.710306][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   66.751498][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   66.916762][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   66.931603][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   66.999509][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   67.051734][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   67.111888][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   67.150813][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   67.203366][ T7367] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   67.217727][ T7427] IPVS: ftp: loaded support on port[0] = 21
[   67.279439][ T7367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   67.318562][ T7373] chnl_net:caif_netlink_parms(): no params data found
[   67.402067][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   67.419206][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   67.458791][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   67.567052][ T7375] bridge0: port 1(bridge_slave_0) entered blocking state
[   67.618048][ T7375] bridge0: port 1(bridge_slave_0) entered disabled state
[   67.626337][ T7375] device bridge_slave_0 entered promiscuous mode
[   67.708919][ T7377] chnl_net:caif_netlink_parms(): no params data found
[   67.741098][ T7367] 8021q: adding VLAN 0 to HW filter on device batadv0
[   67.782708][ T7375] bridge0: port 2(bridge_slave_1) entered blocking state
[   67.798031][ T7375] bridge0: port 2(bridge_slave_1) entered disabled state
[   67.806188][ T7375] device bridge_slave_1 entered promiscuous mode
[   68.023979][ T7369] 8021q: adding VLAN 0 to HW filter on device bond0
[   68.143427][ T7375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   68.192048][ T7373] bridge0: port 1(bridge_slave_0) entered blocking state
[   68.208058][ T7373] bridge0: port 1(bridge_slave_0) entered disabled state
[   68.216267][ T7373] device bridge_slave_0 entered promiscuous mode
[   68.298592][ T7377] bridge0: port 1(bridge_slave_0) entered blocking state
[   68.305677][ T7377] bridge0: port 1(bridge_slave_0) entered disabled state
[   68.349133][ T7377] device bridge_slave_0 entered promiscuous mode
[   68.409720][ T7369] 8021q: adding VLAN 0 to HW filter on device team0
[   68.422023][ T7375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   68.478327][ T7373] bridge0: port 2(bridge_slave_1) entered blocking state
[   68.485405][ T7373] bridge0: port 2(bridge_slave_1) entered disabled state
[   68.528143][ T7373] device bridge_slave_1 entered promiscuous mode
[   68.583260][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   68.618867][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   68.627776][ T7377] bridge0: port 2(bridge_slave_1) entered blocking state
[   68.648386][ T7377] bridge0: port 2(bridge_slave_1) entered disabled state
[   68.728215][ T7377] device bridge_slave_1 entered promiscuous mode
[   68.837497][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   68.850163][    C1] hrtimer: interrupt took 35998 ns
[   68.873981][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   68.959915][ T7391] bridge0: port 1(bridge_slave_0) entered blocking state
[   68.967054][ T7391] bridge0: port 1(bridge_slave_0) entered forwarding state
[   69.018891][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   69.042287][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   69.064659][ T7391] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.071805][ T7391] bridge0: port 2(bridge_slave_1) entered forwarding state
[   69.184698][ T7375] team0: Port device team_slave_0 added
[   69.215292][ T7373] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   69.264791][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   69.298470][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   69.342596][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   69.383562][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   69.417004][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   69.465305][ T7377] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
11:49:35 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = socket$l2tp(0x18, 0x1, 0x1)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0)

[   69.521242][ T7375] team0: Port device team_slave_1 added
[   69.528788][ T7373] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   69.544724][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   69.581910][ T7377] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   69.663449][ T7451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   69.690239][ T7451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   69.736631][ T7369] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   69.747760][ T7369] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   69.760200][ T7427] chnl_net:caif_netlink_parms(): no params data found
[   69.841888][ T7375] device hsr_slave_0 entered promiscuous mode
[   69.888381][ T7375] device hsr_slave_1 entered promiscuous mode
[   69.929675][ T7375] debugfs: Directory 'hsr0' with parent '/' already present!
[   69.938526][ T7373] team0: Port device team_slave_0 added
[   69.959033][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   69.967732][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   69.984120][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   69.993147][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   70.014176][ T7377] team0: Port device team_slave_0 added
[   70.023130][ T7377] team0: Port device team_slave_1 added
[   70.056118][ T7373] team0: Port device team_slave_1 added
[   70.073642][ T7369] 8021q: adding VLAN 0 to HW filter on device batadv0
[   70.116544][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
11:49:36 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = socket$l2tp(0x18, 0x1, 0x1)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0)

[   70.290856][ T7377] device hsr_slave_0 entered promiscuous mode
[   70.322753][ T7377] device hsr_slave_1 entered promiscuous mode
[   70.378008][ T7377] debugfs: Directory 'hsr0' with parent '/' already present!
[   70.441049][ T7373] device hsr_slave_0 entered promiscuous mode
[   70.473191][ T7373] device hsr_slave_1 entered promiscuous mode
[   70.528182][ T7373] debugfs: Directory 'hsr0' with parent '/' already present!
[   70.758075][ T7427] bridge0: port 1(bridge_slave_0) entered blocking state
[   70.765318][ T7427] bridge0: port 1(bridge_slave_0) entered disabled state
[   70.858126][ T7427] device bridge_slave_0 entered promiscuous mode
[   70.882252][ T7427] bridge0: port 2(bridge_slave_1) entered blocking state
[   70.926903][ T7427] bridge0: port 2(bridge_slave_1) entered disabled state
[   70.978941][ T7427] device bridge_slave_1 entered promiscuous mode
11:49:37 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = socket$l2tp(0x18, 0x1, 0x1)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0)

[   71.303612][ T7427] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   71.451273][ T7427] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   71.555099][ T7375] 8021q: adding VLAN 0 to HW filter on device bond0
[   71.669069][ T7377] 8021q: adding VLAN 0 to HW filter on device bond0
[   71.888142][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   71.925217][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   72.018722][ T7377] 8021q: adding VLAN 0 to HW filter on device team0
[   72.096560][ T7373] 8021q: adding VLAN 0 to HW filter on device bond0
[   72.138803][ T7375] 8021q: adding VLAN 0 to HW filter on device team0
[   72.237665][ T7427] team0: Port device team_slave_0 added
[   72.283759][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   72.295671][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   72.327762][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   72.402241][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
11:49:38 executing program 1:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0xa, 0x1, 0x0)
close(r0)
r1 = socket$inet6(0xa, 0x100000000802, 0x0)
setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000340)="ff020400"/24, 0x18)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="35d4a7cf18000000629841c900"}, 0x1c)
sendmmsg$inet_sctp(r0, &(0x7f0000000100), 0xa0, 0x0)

[   72.474856][ T7434] bridge0: port 1(bridge_slave_0) entered blocking state
[   72.482074][ T7434] bridge0: port 1(bridge_slave_0) entered forwarding state
[   72.551175][ T7532] ==================================================================
[   72.559503][ T7532] BUG: KCSAN: data-race in task_dump_owner / task_dump_owner
[   72.566863][ T7532] 
[   72.569210][ T7532] write to 0xffff888125fa62e0 of 4 bytes by task 7528 on cpu 0:
[   72.576844][ T7532]  task_dump_owner+0x246/0x260
[   72.581633][ T7532]  pid_update_inode+0x3c/0x70
[   72.586309][ T7532]  pid_revalidate+0x91/0xd0
[   72.590811][ T7532]  lookup_fast+0x618/0x700
[   72.595223][ T7532]  path_openat+0x2ac/0x36e0
[   72.599735][ T7532]  do_filp_open+0x11e/0x1b0
[   72.604233][ T7532]  do_sys_open+0x3b3/0x4f0
[   72.608649][ T7532]  __x64_sys_open+0x55/0x70
[   72.613150][ T7532]  do_syscall_64+0xcc/0x370
[   72.617838][ T7532]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   72.623802][ T7532] 
[   72.626129][ T7532] write to 0xffff888125fa62e0 of 4 bytes by task 7532 on cpu 1:
[   72.633847][ T7532]  task_dump_owner+0x246/0x260
[   72.638618][ T7532]  pid_update_inode+0x3c/0x70
[   72.643298][ T7532]  pid_revalidate+0x91/0xd0
[   72.647852][ T7532]  lookup_fast+0x618/0x700
[   72.652354][ T7532]  path_openat+0x2ac/0x36e0
[   72.657569][ T7532]  do_filp_open+0x11e/0x1b0
[   72.662091][ T7532]  do_sys_open+0x3b3/0x4f0
[   72.666507][ T7532]  __x64_sys_open+0x55/0x70
[   72.671119][ T7532]  do_syscall_64+0xcc/0x370
[   72.675760][ T7532]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   72.683076][ T7532] 
[   72.686358][ T7532] Reported by Kernel Concurrency Sanitizer on:
[   72.692508][ T7532] CPU: 1 PID: 7532 Comm: ps Not tainted 5.4.0-rc3+ #0
[   72.699253][ T7532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   72.709299][ T7532] ==================================================================
[   72.717362][ T7532] Kernel panic - not syncing: panic_on_warn set ...
[   72.723949][ T7532] CPU: 1 PID: 7532 Comm: ps Not tainted 5.4.0-rc3+ #0
[   72.730886][ T7532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   72.740964][ T7532] Call Trace:
[   72.744262][ T7532]  dump_stack+0xf5/0x159
[   72.748621][ T7532]  panic+0x210/0x640
[   72.752523][ T7532]  ? do_syscall_64+0xcc/0x370
[   72.757199][ T7532]  ? vprintk_func+0x8d/0x140
[   72.761799][ T7532]  kcsan_report.cold+0xc/0x10
[   72.766483][ T7532]  __kcsan_setup_watchpoint+0x32e/0x4a0
[   72.772057][ T7532]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   72.777711][ T7532]  __tsan_write4+0x32/0x40
[   72.782152][ T7532]  task_dump_owner+0x246/0x260
[   72.786922][ T7532]  ? __rcu_read_unlock+0x66/0x3c0
[   72.791949][ T7532]  pid_update_inode+0x3c/0x70
[   72.796632][ T7532]  pid_revalidate+0x91/0xd0
[   72.801149][ T7532]  lookup_fast+0x618/0x700
[   72.805579][ T7532]  path_openat+0x2ac/0x36e0
[   72.810094][ T7532]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   72.815745][ T7532]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   72.821392][ T7532]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   72.827026][ T7532]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   72.832664][ T7532]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   72.838300][ T7532]  ? __sanitizer_cov_trace_switch+0x49/0x80
[   72.844193][ T7532]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   72.849831][ T7532]  do_filp_open+0x11e/0x1b0
[   72.854374][ T7532]  ? __alloc_fd+0x316/0x4c0
[   72.859110][ T7532]  do_sys_open+0x3b3/0x4f0
[   72.863666][ T7532]  __x64_sys_open+0x55/0x70
[   72.868696][ T7532]  do_syscall_64+0xcc/0x370
[   72.873205][ T7532]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   72.879116][ T7532] RIP: 0033:0x7ff9c7ed9120
[   72.883650][ T7532] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24
[   72.903254][ T7532] RSP: 002b:00007ffe1f6d9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[   72.911789][ T7532] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007ff9c7ed9120
[   72.919764][ T7532] RDX: 00007ffe1f6d9ac2 RSI: 0000000000000000 RDI: 00007ffe1f6d9ab0
[   72.927765][ T7532] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007ff9c81a155f
[   72.936526][ T7532] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000009e3220
[   72.944502][ T7532] R13: 0000000000000020 R14: 00007ff9c858e010 R15: 0000000000000000
[   72.953298][ T7532] Kernel Offset: disabled
[   72.957722][ T7532] Rebooting in 86400 seconds..