[ 37.730660][ T25] audit: type=1800 audit(1572133065.595:24): pid=7204 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2487 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.120332][ T25] audit: type=1800 audit(1572133066.085:25): pid=7204 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 38.158517][ T25] audit: type=1800 audit(1572133066.085:26): pid=7204 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.208' (ECDSA) to the list of known hosts. 2019/10/26 23:37:55 fuzzer started 2019/10/26 23:37:56 dialing manager at 10.128.0.105:33655 2019/10/26 23:37:57 syscalls: 2533 2019/10/26 23:37:57 code coverage: enabled 2019/10/26 23:37:57 comparison tracing: enabled 2019/10/26 23:37:57 extra coverage: extra coverage is not supported by the kernel 2019/10/26 23:37:57 setuid sandbox: enabled 2019/10/26 23:37:57 namespace sandbox: enabled 2019/10/26 23:37:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/26 23:37:57 fault injection: enabled 2019/10/26 23:37:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/26 23:37:57 net packet injection: enabled 2019/10/26 23:37:57 net device setup: enabled 2019/10/26 23:37:57 concurrency sanitizer: enabled syzkaller login: [ 55.207048][ T7371] KCSAN: could not find function: 'poll_schedule_timeout' 2019/10/26 23:38:25 adding functions to KCSAN blacklist: '__dev_queue_xmit' 'pipe_wait' '__ext4_new_inode' 'update_defense_level' 'ktime_get_seconds' 'ext4_mb_good_group' 'sk_wait_data' 'copy_creds' 'kvm_arch_vcpu_create' 'vm_area_dup' 'ext4_free_inodes_count' 'icmp_global_allow' 'process_srcu' 'batadv_tt_local_add' 'generic_write_end' 'commit_echoes' 'snapshot_refaults' 'bio_endio' 'p9_poll_workfn' 'copy_process' 'ext4_setattr' 'shmem_add_to_page_cache' 'tomoyo_check_path_acl' 'find_next_bit' 'poll_schedule_timeout' 'sit_tunnel_xmit' 'vti_tunnel_xmit' 'xas_clear_mark' 'dd_has_work' 'xas_find_marked' 'futex_wait_queue_me' 'ip_finish_output2' 'generic_permission' 'tick_nohz_idle_stop_tick' '__acct_update_integrals' 'inet_dgram_connect' '__hrtimer_run_queues' '__skb_try_recv_from_queue' 'blk_mq_get_request' 'virtnet_poll_tx' 'mem_cgroup_select_victim_node' 'ep_poll' 'kvm_arch_vcpu_load' 'rcu_gp_fqs_check_wake' 'taskstats_exit' 'audit_log_start' '__skb_recv_udp' 'find_get_pages_range_tag' '__find_get_block' 'ktime_get_real_seconds' 'ext4_has_free_clusters' 'wbt_done' '__alloc_file' 'snd_seq_prioq_cell_out' 'pipe_poll' 'fsnotify' 'timer_clear_idle' 'kauditd_thread' 'rcu_gp_fqs_loop' 'shmem_getpage_gfp' 'echo_char' '__add_to_page_cache_locked' 'ext4_da_write_end' 'blk_stat_add' 'generic_fillattr' 'dccp_rcv_close' 'blk_mq_dispatch_rq_list' '__snd_rawmidi_transmit_ack' 'do_exit' 'osq_lock' 'list_lru_count_one' 'pid_update_inode' 'tcp_poll' 'mod_timer' 'vfs_fsync_range' 'tcp_add_backlog' '__delete_from_page_cache' 'fib6_ifup' 'filemap_map_pages' 'do_syslog' '__nf_conntrack_find_get' 'ext4_mark_iloc_dirty' 'kernfs_refresh_inode' 'ext4_ext_insert_extent' 'list_lru_add' 'tick_sched_do_timer' 'tcp_sendmsg_locked' 'tick_do_update_jiffies64' 'task_dump_owner' 'tcp_v4_rcv' 'blk_mq_run_hw_queue' '__skb_wait_for_more_packets' 'd_delete' 'get_task_cred' 'ext4_free_inode' 'ext4_nonda_switch' 'inet_putpeer' 'queue_access_lock' 'pvclock_gtod_notify' 'fprop_fraction_percpu' 'get_task_mm' 'balance_dirty_pages' 'shmem_file_read_iter' 'run_timer_softirq' 'n_tty_receive_buf_common' 'atime_needs_update' 'ipip_tunnel_xmit' 'tomoyo_supervisor' '__nf_ct_refresh_acct' 'add_timer' 'common_perm_cond' 'wbt_issue' 'page_counter_try_charge' '__neigh_event_send' 'datagram_poll' 'pcpu_alloc' 'blk_mq_sched_dispatch_requests' 'mm_update_next_owner' 'do_readlinkat' 'do_nanosleep' 'watchdog' 23:41:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 23:41:10 executing program 1: r0 = socket(0x80000000000000a, 0x3, 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x30, &(0x7f0000000fc0)=ANY=[], 0x0) [ 242.626991][ T7375] IPVS: ftp: loaded support on port[0] = 21 [ 242.808100][ T7375] chnl_net:caif_netlink_parms(): no params data found [ 242.858252][ T7378] IPVS: ftp: loaded support on port[0] = 21 [ 242.858596][ T7375] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.872080][ T7375] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.880381][ T7375] device bridge_slave_0 entered promiscuous mode [ 242.891568][ T7375] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.898822][ T7375] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.908022][ T7375] device bridge_slave_1 entered promiscuous mode 23:41:10 executing program 2: sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)) getpid() ioprio_set$pid(0x2, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x5}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500000000000000", @ANYRES32], 0x2}}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000280)=@can, 0x80) [ 242.957232][ T7375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 242.978748][ T7375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.076299][ T7375] team0: Port device team_slave_0 added [ 243.083355][ T7375] team0: Port device team_slave_1 added [ 243.110988][ T7378] chnl_net:caif_netlink_parms(): no params data found [ 243.208085][ T7375] device hsr_slave_0 entered promiscuous mode 23:41:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) socket$inet(0x10, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getpid() rt_tgsigqueueinfo(r2, 0x0, 0x16, &(0x7f0000000340)={0x3a, 0x20001, 0x8}) ptrace$getsig(0x18, r2, 0x0, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x14103e, 0x0) accept$packet(r3, 0x0, &(0x7f0000000000)) r4 = open(&(0x7f0000000140)='./bus\x00', 0x14103e, 0x0) accept$packet(r4, 0x0, &(0x7f0000000000)) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r5, 0x9) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000240)={0x9e, 0xffffff58, 0x3ff, 0x3, 0x800}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r5, 0x0, 0x1, &(0x7f00000003c0)='\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='/dev/input/mouse#\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r4, 0x0, 0x1, &(0x7f00000000c0)='\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r1, 0x0, 0x0, 0x0, r6}, 0x30) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8971495abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) clock_settime(0x0, &(0x7f00000001c0)) r7 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) fcntl$setlease(r7, 0x400, 0x1) [ 243.274032][ T7375] device hsr_slave_1 entered promiscuous mode [ 243.368275][ T7378] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.386224][ T7378] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.407244][ T7378] device bridge_slave_0 entered promiscuous mode [ 243.427421][ T7378] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.434664][ T7378] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.453681][ T7378] device bridge_slave_1 entered promiscuous mode [ 243.496900][ T7381] IPVS: ftp: loaded support on port[0] = 21 [ 243.535396][ T7378] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.558894][ T7378] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.595834][ T7383] IPVS: ftp: loaded support on port[0] = 21 [ 243.677254][ T7378] team0: Port device team_slave_0 added [ 243.700315][ T7375] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.707423][ T7375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.715630][ T7375] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.722675][ T7375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.834904][ T7378] team0: Port device team_slave_1 added 23:41:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0124fc001000084002000000053582c137153e370900018004001700d1bd", 0x2e}], 0x1}, 0x0) [ 243.885694][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.925769][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.126660][ T7378] device hsr_slave_0 entered promiscuous mode [ 244.155645][ T7378] device hsr_slave_1 entered promiscuous mode [ 244.215207][ T7378] debugfs: Directory 'hsr0' with parent '/' already present! [ 244.362715][ T7375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.501584][ T7375] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.562410][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.641948][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.674431][ T7381] chnl_net:caif_netlink_parms(): no params data found [ 244.787424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.797316][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.864129][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.871220][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.940744][ T7383] chnl_net:caif_netlink_parms(): no params data found [ 245.052172][ T7416] IPVS: ftp: loaded support on port[0] = 21 [ 245.074922][ T7407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.103804][ T7407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.154005][ T7407] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.161179][ T7407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.234465][ T7407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.343900][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.387055][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.424573][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 23:41:13 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x90, 0x0, &(0x7f00000001c0)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f00000000c0)}}], 0x0, 0x0, 0x0}) [ 245.487830][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.529203][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.595094][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.657184][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.705604][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.837607][ T7375] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 245.894129][ T7375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.951093][ T7407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.977692][ T7407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.079436][ T7375] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.137002][ T7381] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.145281][ T7381] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.203226][ T7381] device bridge_slave_0 entered promiscuous mode [ 246.245266][ T7381] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.252364][ T7381] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.334694][ T7381] device bridge_slave_1 entered promiscuous mode [ 246.432714][ T7378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.501630][ T7381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.528403][ T7437] IPVS: ftp: loaded support on port[0] = 21 [ 246.534446][ T7383] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.541487][ T7383] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.600716][ T7383] device bridge_slave_0 entered promiscuous mode [ 246.659727][ T7381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.726864][ T7383] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.752980][ T7383] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.784776][ T7383] device bridge_slave_1 entered promiscuous mode [ 246.835218][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.887249][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.939128][ T7378] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.031372][ T7381] team0: Port device team_slave_0 added [ 247.067347][ T7381] team0: Port device team_slave_1 added [ 247.118790][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.138752][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.196517][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.200079][ C1] hrtimer: interrupt took 42804 ns [ 247.203654][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.296933][ T7383] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 23:41:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000000)='md5sumeth0GPLbdev\x00') sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, &(0x7f00000000c0)) connect$inet(r0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) close(r3) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000001c00)={0x0, 0x7}, &(0x7f0000001c40)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000001c80)={r4}, &(0x7f00000007c0)=0x8) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4, 0x4}}, 0x26) getsockopt$packet_buf(r2, 0x111, 0x4, 0x0, &(0x7f0000000040)) listen(0xffffffffffffffff, 0x2) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x20}, {}]}, 0x10) r6 = accept4(r5, 0x0, 0x0, 0x1800) shutdown(r6, 0x0) ioctl$PPPIOCGL2TPSTATS(r6, 0x80487436, &(0x7f0000000280)="58d0d2a93547089a628413b67e402b7bfb5940d5e9e294a1b2a357c5fce281d587e17182e3d15910ba2b7b7ba2d9b60219c98d8fd20e63111b21cfa506eae47a42e356ec") ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000280)) [ 247.426826][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.458711][ T7383] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 247.570290][ T7381] device hsr_slave_0 entered promiscuous mode [ 247.622547][ T7420] ================================================================== [ 247.626944][ T7381] device hsr_slave_1 entered promiscuous mode [ 247.630676][ T7420] BUG: KCSAN: data-race in get_wchan / handle_mm_fault [ 247.643544][ T7420] [ 247.645872][ T7420] read to 0xffff8880a84f3090 of 8 bytes by task 7431 on cpu 0: [ 247.653424][ T7420] get_wchan+0x47/0x180 [ 247.657581][ T7420] do_task_stat+0xdf0/0x1370 [ 247.662166][ T7420] proc_tgid_stat+0x3d/0x60 [ 247.666688][ T7420] proc_single_show+0x89/0xe0 [ 247.671364][ T7420] seq_read+0x350/0x960 [ 247.675528][ T7420] __vfs_read+0x67/0xc0 [ 247.679689][ T7420] vfs_read+0x143/0x2c0 [ 247.683842][ T7420] ksys_read+0xd5/0x1b0 [ 247.687997][ T7420] __x64_sys_read+0x4c/0x60 [ 247.692502][ T7420] do_syscall_64+0xcc/0x370 [ 247.697204][ T7420] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 247.703086][ T7420] [ 247.705427][ T7420] write to 0xffff8880a84f3090 of 8 bytes by task 7420 on cpu 1: [ 247.713062][ T7420] handle_mm_fault+0x4a/0x530 [ 247.717752][ T7420] __do_page_fault+0x3fb/0x9e0 [ 247.722525][ T7420] do_page_fault+0x54/0x233 [ 247.727027][ T7420] page_fault+0x34/0x40 [ 247.731171][ T7420] [ 247.733488][ T7420] Reported by Kernel Concurrency Sanitizer on: [ 247.739661][ T7420] CPU: 1 PID: 7420 Comm: net.agent Not tainted 5.4.0-rc3+ #0 [ 247.747221][ T7420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.757280][ T7420] ================================================================== [ 247.765345][ T7420] Kernel panic - not syncing: panic_on_warn set ... [ 247.772048][ T7420] CPU: 1 PID: 7420 Comm: net.agent Not tainted 5.4.0-rc3+ #0 [ 247.779493][ T7420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.789533][ T7420] Call Trace: [ 247.792816][ T7420] dump_stack+0xf5/0x159 [ 247.797042][ T7420] panic+0x210/0x640 [ 247.800936][ T7420] ? vprintk_func+0x8d/0x140 [ 247.805599][ T7420] kcsan_report.cold+0xc/0x10 [ 247.810257][ T7420] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 247.815792][ T7420] __tsan_write8+0x32/0x40 [ 247.820197][ T7420] handle_mm_fault+0x4a/0x530 [ 247.824869][ T7420] __do_page_fault+0x3fb/0x9e0 [ 247.829627][ T7420] do_page_fault+0x54/0x233 [ 247.834116][ T7420] ? do_syscall_64+0x270/0x370 [ 247.838863][ T7420] page_fault+0x34/0x40 [ 247.843000][ T7420] RIP: 0033:0x40f2a8 [ 247.846986][ T7420] Code: 02 89 3d db d2 20 00 48 98 c6 80 20 9e 61 00 01 75 0a 48 83 3d 78 a9 20 00 00 74 36 48 83 c4 08 c3 90 48 83 3d e0 a9 20 00 00 05 4e d2 20 00 01 00 00 00 74 e6 c6 05 75 ab 20 00 01 c7 05 9b [ 247.866840][ T7420] RSP: 002b:00007fffd0c4a730 EFLAGS: 00010246 [ 247.872889][ T7420] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 00007f5269e30310 [ 247.880867][ T7420] RDX: 00007fffd0c4a740 RSI: 00007fffd0c4a870 RDI: 0000000000000011 [ 247.888930][ T7420] RBP: 00000000004132a2 R08: 0000000000001cfc R09: 0000000000001cfc [ 247.896891][ T7420] R10: 00007f526a3029d0 R11: 0000000000000246 R12: 000000000108677f [ 247.904840][ T7420] R13: 0000000000000100 R14: 0000000000415c42 R15: 0000000000000101 [ 247.914577][ T7420] Kernel Offset: disabled [ 247.918921][ T7420] Rebooting in 86400 seconds..