[ 35.812414][ T26] audit: type=1800 audit(1572004142.076:24): pid=7200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2487 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.346930][ T26] audit: type=1800 audit(1572004142.686:25): pid=7200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 36.380276][ T26] audit: type=1800 audit(1572004142.686:26): pid=7200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.193' (ECDSA) to the list of known hosts. 2019/10/25 11:49:14 fuzzer started 2019/10/25 11:49:16 dialing manager at 10.128.0.105:33971 2019/10/25 11:49:17 syscalls: 2529 2019/10/25 11:49:17 code coverage: enabled 2019/10/25 11:49:17 comparison tracing: enabled 2019/10/25 11:49:17 extra coverage: extra coverage is not supported by the kernel 2019/10/25 11:49:17 setuid sandbox: enabled 2019/10/25 11:49:17 namespace sandbox: enabled 2019/10/25 11:49:17 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/25 11:49:17 fault injection: enabled 2019/10/25 11:49:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/25 11:49:17 net packet injection: enabled 2019/10/25 11:49:17 net device setup: enabled 2019/10/25 11:49:17 concurrency sanitizer: enabled 2019/10/25 11:49:21 adding functions to KCSAN blacklist: 'tick_sched_do_timer' '__hrtimer_run_queues' '__tcp_select_window' 'generic_write_end' 'pid_update_inode' 'ep_poll' 'tcp_poll' 'taskstats_exit' 'generic_fillattr' 'find_next_bit' 'tomoyo_supervisor' 'rcu_gp_fqs_check_wake' '__ext4_new_inode' 'echo_char' 'ktime_get_real_seconds' 'pipe_poll' 'mod_timer' 'blk_mq_dispatch_rq_list' 'generic_permission' 'run_timer_softirq' 'ext4_free_inodes_count' 'tcp_add_backlog' 'ext4_setattr' '__nf_ct_refresh_acct' 'tick_do_update_jiffies64' 11:49:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 11:49:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6(0xa, 0x100000000802, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000340)="ff020400"/24, 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="35d4a7cf18000000629841c900"}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000100), 0xa0, 0x0) syzkaller login: [ 64.206242][ T7367] IPVS: ftp: loaded support on port[0] = 21 [ 64.351024][ T7369] IPVS: ftp: loaded support on port[0] = 21 [ 64.395270][ T7367] chnl_net:caif_netlink_parms(): no params data found [ 64.474919][ T7367] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.483813][ T7367] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.492666][ T7367] device bridge_slave_0 entered promiscuous mode [ 64.511806][ T7367] bridge0: port 2(bridge_slave_1) entered blocking state 11:49:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) [ 64.519929][ T7367] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.529104][ T7367] device bridge_slave_1 entered promiscuous mode [ 64.622106][ T7367] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.634829][ T7369] chnl_net:caif_netlink_parms(): no params data found [ 64.647695][ T7367] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.704045][ T7367] team0: Port device team_slave_0 added [ 64.711455][ T7367] team0: Port device team_slave_1 added [ 64.717408][ T7369] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.726986][ T7369] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.735457][ T7369] device bridge_slave_0 entered promiscuous mode [ 64.769556][ T7369] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.776662][ T7369] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.787202][ T7369] device bridge_slave_1 entered promiscuous mode 11:49:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) connect$inet6(r1, 0x0, 0xffffffffffffff56) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/17, 0x11}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x801, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000003c0)=0x6, 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r2, 0x1) socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) [ 65.002872][ T7367] device hsr_slave_0 entered promiscuous mode 11:49:31 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xde, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10003) [ 65.158364][ T7367] device hsr_slave_1 entered promiscuous mode [ 65.236013][ T7375] IPVS: ftp: loaded support on port[0] = 21 [ 65.250195][ T7373] IPVS: ftp: loaded support on port[0] = 21 [ 65.271083][ T7369] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.354350][ T7369] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.437565][ T7377] IPVS: ftp: loaded support on port[0] = 21 [ 65.500384][ T7369] team0: Port device team_slave_0 added [ 65.506712][ T7367] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.513885][ T7367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.521314][ T7367] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.528428][ T7367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.588256][ T1062] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.619591][ T1062] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.663914][ T7369] team0: Port device team_slave_1 added 11:49:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00739fe780a082d3d293fb9ccb59491f"], 0x50}}, 0x0) [ 65.883149][ T7369] device hsr_slave_0 entered promiscuous mode [ 65.940135][ T7369] device hsr_slave_1 entered promiscuous mode [ 65.960859][ T7369] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.065684][ T7367] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.202301][ T7367] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.247050][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.270135][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.346393][ T7375] chnl_net:caif_netlink_parms(): no params data found [ 66.384748][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.410461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.469959][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.477114][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.570625][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.618980][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.658565][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.665663][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.710306][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.751498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.916762][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.931603][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.999509][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.051734][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.111888][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.150813][ T1062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.203366][ T7367] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.217727][ T7427] IPVS: ftp: loaded support on port[0] = 21 [ 67.279439][ T7367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.318562][ T7373] chnl_net:caif_netlink_parms(): no params data found [ 67.402067][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.419206][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.458791][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.567052][ T7375] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.618048][ T7375] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.626337][ T7375] device bridge_slave_0 entered promiscuous mode [ 67.708919][ T7377] chnl_net:caif_netlink_parms(): no params data found [ 67.741098][ T7367] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.782708][ T7375] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.798031][ T7375] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.806188][ T7375] device bridge_slave_1 entered promiscuous mode [ 68.023979][ T7369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.143427][ T7375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.192048][ T7373] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.208058][ T7373] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.216267][ T7373] device bridge_slave_0 entered promiscuous mode [ 68.298592][ T7377] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.305677][ T7377] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.349133][ T7377] device bridge_slave_0 entered promiscuous mode [ 68.409720][ T7369] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.422023][ T7375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.478327][ T7373] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.485405][ T7373] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.528143][ T7373] device bridge_slave_1 entered promiscuous mode [ 68.583260][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.618867][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.627776][ T7377] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.648386][ T7377] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.728215][ T7377] device bridge_slave_1 entered promiscuous mode [ 68.837497][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.850163][ C1] hrtimer: interrupt took 35998 ns [ 68.873981][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.959915][ T7391] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.967054][ T7391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.018891][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.042287][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.064659][ T7391] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.071805][ T7391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.184698][ T7375] team0: Port device team_slave_0 added [ 69.215292][ T7373] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.264791][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.298470][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.342596][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.383562][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.417004][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.465305][ T7377] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 11:49:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 69.521242][ T7375] team0: Port device team_slave_1 added [ 69.528788][ T7373] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.544724][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.581910][ T7377] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.663449][ T7451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.690239][ T7451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.736631][ T7369] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 69.747760][ T7369] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 69.760200][ T7427] chnl_net:caif_netlink_parms(): no params data found [ 69.841888][ T7375] device hsr_slave_0 entered promiscuous mode [ 69.888381][ T7375] device hsr_slave_1 entered promiscuous mode [ 69.929675][ T7375] debugfs: Directory 'hsr0' with parent '/' already present! [ 69.938526][ T7373] team0: Port device team_slave_0 added [ 69.959033][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.967732][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.984120][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.993147][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.014176][ T7377] team0: Port device team_slave_0 added [ 70.023130][ T7377] team0: Port device team_slave_1 added [ 70.056118][ T7373] team0: Port device team_slave_1 added [ 70.073642][ T7369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.116544][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:49:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 70.290856][ T7377] device hsr_slave_0 entered promiscuous mode [ 70.322753][ T7377] device hsr_slave_1 entered promiscuous mode [ 70.378008][ T7377] debugfs: Directory 'hsr0' with parent '/' already present! [ 70.441049][ T7373] device hsr_slave_0 entered promiscuous mode [ 70.473191][ T7373] device hsr_slave_1 entered promiscuous mode [ 70.528182][ T7373] debugfs: Directory 'hsr0' with parent '/' already present! [ 70.758075][ T7427] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.765318][ T7427] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.858126][ T7427] device bridge_slave_0 entered promiscuous mode [ 70.882252][ T7427] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.926903][ T7427] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.978941][ T7427] device bridge_slave_1 entered promiscuous mode 11:49:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 71.303612][ T7427] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.451273][ T7427] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.555099][ T7375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.669069][ T7377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.888142][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.925217][ T7391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.018722][ T7377] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.096560][ T7373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.138803][ T7375] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.237665][ T7427] team0: Port device team_slave_0 added [ 72.283759][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.295671][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.327762][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.402241][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 11:49:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6(0xa, 0x100000000802, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000340)="ff020400"/24, 0x18) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="35d4a7cf18000000629841c900"}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000000100), 0xa0, 0x0) [ 72.474856][ T7434] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.482074][ T7434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.551175][ T7532] ================================================================== [ 72.559503][ T7532] BUG: KCSAN: data-race in task_dump_owner / task_dump_owner [ 72.566863][ T7532] [ 72.569210][ T7532] write to 0xffff888125fa62e0 of 4 bytes by task 7528 on cpu 0: [ 72.576844][ T7532] task_dump_owner+0x246/0x260 [ 72.581633][ T7532] pid_update_inode+0x3c/0x70 [ 72.586309][ T7532] pid_revalidate+0x91/0xd0 [ 72.590811][ T7532] lookup_fast+0x618/0x700 [ 72.595223][ T7532] path_openat+0x2ac/0x36e0 [ 72.599735][ T7532] do_filp_open+0x11e/0x1b0 [ 72.604233][ T7532] do_sys_open+0x3b3/0x4f0 [ 72.608649][ T7532] __x64_sys_open+0x55/0x70 [ 72.613150][ T7532] do_syscall_64+0xcc/0x370 [ 72.617838][ T7532] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.623802][ T7532] [ 72.626129][ T7532] write to 0xffff888125fa62e0 of 4 bytes by task 7532 on cpu 1: [ 72.633847][ T7532] task_dump_owner+0x246/0x260 [ 72.638618][ T7532] pid_update_inode+0x3c/0x70 [ 72.643298][ T7532] pid_revalidate+0x91/0xd0 [ 72.647852][ T7532] lookup_fast+0x618/0x700 [ 72.652354][ T7532] path_openat+0x2ac/0x36e0 [ 72.657569][ T7532] do_filp_open+0x11e/0x1b0 [ 72.662091][ T7532] do_sys_open+0x3b3/0x4f0 [ 72.666507][ T7532] __x64_sys_open+0x55/0x70 [ 72.671119][ T7532] do_syscall_64+0xcc/0x370 [ 72.675760][ T7532] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.683076][ T7532] [ 72.686358][ T7532] Reported by Kernel Concurrency Sanitizer on: [ 72.692508][ T7532] CPU: 1 PID: 7532 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 72.699253][ T7532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.709299][ T7532] ================================================================== [ 72.717362][ T7532] Kernel panic - not syncing: panic_on_warn set ... [ 72.723949][ T7532] CPU: 1 PID: 7532 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 72.730886][ T7532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.740964][ T7532] Call Trace: [ 72.744262][ T7532] dump_stack+0xf5/0x159 [ 72.748621][ T7532] panic+0x210/0x640 [ 72.752523][ T7532] ? do_syscall_64+0xcc/0x370 [ 72.757199][ T7532] ? vprintk_func+0x8d/0x140 [ 72.761799][ T7532] kcsan_report.cold+0xc/0x10 [ 72.766483][ T7532] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 72.772057][ T7532] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.777711][ T7532] __tsan_write4+0x32/0x40 [ 72.782152][ T7532] task_dump_owner+0x246/0x260 [ 72.786922][ T7532] ? __rcu_read_unlock+0x66/0x3c0 [ 72.791949][ T7532] pid_update_inode+0x3c/0x70 [ 72.796632][ T7532] pid_revalidate+0x91/0xd0 [ 72.801149][ T7532] lookup_fast+0x618/0x700 [ 72.805579][ T7532] path_openat+0x2ac/0x36e0 [ 72.810094][ T7532] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.815745][ T7532] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.821392][ T7532] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.827026][ T7532] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.832664][ T7532] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.838300][ T7532] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 72.844193][ T7532] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.849831][ T7532] do_filp_open+0x11e/0x1b0 [ 72.854374][ T7532] ? __alloc_fd+0x316/0x4c0 [ 72.859110][ T7532] do_sys_open+0x3b3/0x4f0 [ 72.863666][ T7532] __x64_sys_open+0x55/0x70 [ 72.868696][ T7532] do_syscall_64+0xcc/0x370 [ 72.873205][ T7532] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.879116][ T7532] RIP: 0033:0x7ff9c7ed9120 [ 72.883650][ T7532] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 72.903254][ T7532] RSP: 002b:00007ffe1f6d9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 72.911789][ T7532] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007ff9c7ed9120 [ 72.919764][ T7532] RDX: 00007ffe1f6d9ac2 RSI: 0000000000000000 RDI: 00007ffe1f6d9ab0 [ 72.927765][ T7532] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007ff9c81a155f [ 72.936526][ T7532] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000009e3220 [ 72.944502][ T7532] R13: 0000000000000020 R14: 00007ff9c858e010 R15: 0000000000000000 [ 72.953298][ T7532] Kernel Offset: disabled [ 72.957722][ T7532] Rebooting in 86400 seconds..