[ 51.784230][ T26] audit: type=1800 audit(1573210380.138:27): pid=7873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.807220][ T26] audit: type=1800 audit(1573210380.138:28): pid=7873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.606105][ T26] audit: type=1800 audit(1573210381.058:29): pid=7873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 52.626438][ T26] audit: type=1800 audit(1573210381.058:30): pid=7873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.218' (ECDSA) to the list of known hosts. 2019/11/08 10:53:12 fuzzer started 2019/11/08 10:53:13 dialing manager at 10.128.0.105:41185 2019/11/08 10:53:14 syscalls: 2553 2019/11/08 10:53:14 code coverage: enabled 2019/11/08 10:53:14 comparison tracing: enabled 2019/11/08 10:53:14 extra coverage: extra coverage is not supported by the kernel 2019/11/08 10:53:14 setuid sandbox: enabled 2019/11/08 10:53:14 namespace sandbox: enabled 2019/11/08 10:53:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/08 10:53:14 fault injection: enabled 2019/11/08 10:53:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/08 10:53:14 net packet injection: enabled 2019/11/08 10:53:14 net device setup: enabled 2019/11/08 10:53:14 concurrency sanitizer: enabled 2019/11/08 10:53:14 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 66.287263][ T8041] KCSAN: could not find function: 'may_open' [ 72.087226][ T8041] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/08 10:53:26 adding functions to KCSAN blacklist: 'may_open' 'taskstats_exit' 'blk_mq_sched_dispatch_requests' 'queue_access_lock' 'wbc_detach_inode' 'tick_sched_do_timer' 'pipe_wait' 'blk_mq_run_hw_queue' 'generic_fillattr' '__ip6_datagram_connect' 'do_nanosleep' 'process_srcu' 'lruvec_lru_size' 'echo_char' 'mm_update_next_owner' 'tick_do_update_jiffies64' 'ima_file_free' 'rcu_gp_fqs_check_wake' 'padata_find_next' 'wbt_done' 'kcm_rfree' 'dd_has_work' '__ext4_new_inode' 'ktime_get_seconds' 'task_dump_owner' 'do_exit' '__dev_queue_xmit' 'do_dentry_open' 'blk_mq_dispatch_rq_list' 'p9_poll_workfn' 'poll_schedule_timeout' 'mem_cgroup_select_victim_node' 'timer_clear_idle' 'ext4_da_write_end' 'run_timer_softirq' 'find_get_pages_range_tag' 'ext4_nonda_switch' 'xas_clear_mark' 'ext4_has_free_clusters' 'audit_log_start' 'kauditd_thread' '__hrtimer_run_queues' 'common_perm_cond' 'pid_update_inode' 'n_tty_receive_buf_common' 'blk_mq_get_request' 'inactive_list_is_low' 'ext4_free_inodes_count' '__perf_event_overflow' 'inet_putpeer' 'wbc_attach_and_unlock_inode' 'find_next_bit' 'pipe_poll' 'add_timer' 'tick_nohz_idle_stop_tick' 'generic_permission' 'tomoyo_supervisor' 'tcp_add_backlog' 'ep_poll' 'pcpu_alloc' 'copy_process' 'fanout_demux_rollover' 'vm_area_dup' 'rcu_gp_fqs_loop' 'mod_timer' '__tcp_transmit_skb' 'xas_find_marked' '__snd_rawmidi_transmit_ack' 'futex_wait_queue_me' 'add_timer_on' 'ktime_get_real_seconds' 'generic_write_end' 'ext4_free_inode' 10:56:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x126}}, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) writev(r2, &(0x7f00000004c0)=[{&(0x7f00000002c0)="408a2f8ce1c03a2eb716bb5f2f46cd1bc2c95c51096e7808daa659510434fd7ca8292cafba22dd032eebc9197910022e064bacaf0bb271d28b16a29dd238bf23f8eb51b94b5635a33a17c805d5035a29dbe4c53232265c57e2684d909de1b87a03663df795bbcb53c6fe1d281fca6bd3771cc9753f44ab50240a0cb21c71e89294", 0x81}, {&(0x7f0000000380)="39aed5ee0eeb9a751cdec683a943e1782a624e2842a391f87a3acd54d97c558581cd340332c30ea5adaf207657f67d65db346f1d05494dc6c6ab84dde61340c5ef02e4a0fb1d36cffb03c02b1c9fd07e941d31e6c5ca174b2cb09a8b1aebd8c7fb9fba5dd6561a3d5ea6b74dae7bb0e54d80b334", 0x74}, {&(0x7f0000000240)}, {&(0x7f0000000400)="e6133d39ceb4f80ea493e41bf10e1c8f63253c761d6c8976b63224b4c7e1a9e7c91b5134f27b8bfec3bb6ca9447314b7253cd2026a1650b00bc20dd69ee2fd98d969b9499c67518ca2d692a86d7e6182ec86a13ba56492ca94740d87ce3941a1bda6ede3914a1166e02e4f45f46be199476e5216e5cc143683de4783420906571b24e6643da470da27", 0x89}], 0x4) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x126}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r5}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x34, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x28, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x21}]}}}]}, 0x54}}, 0x0) 10:56:13 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) lsetxattr(0x0, 0x0, &(0x7f0000000240)='}\x00', 0x2, 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x5) socket$l2tp(0x18, 0x1, 0x1) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$caif_stream(0x25, 0x1, 0x0) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) [ 244.698240][ T8043] IPVS: ftp: loaded support on port[0] = 21 [ 244.822090][ T8043] chnl_net:caif_netlink_parms(): no params data found [ 244.825988][ T8046] IPVS: ftp: loaded support on port[0] = 21 [ 244.854846][ T8043] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.862480][ T8043] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.871313][ T8043] device bridge_slave_0 entered promiscuous mode [ 244.887785][ T8043] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.895759][ T8043] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.904126][ T8043] device bridge_slave_1 entered promiscuous mode [ 244.935638][ T8043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 244.948154][ T8043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 244.971146][ T8043] team0: Port device team_slave_0 added 10:56:13 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000380)={0x1, 0x1, 0x1000, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB], 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) [ 244.981286][ T8043] team0: Port device team_slave_1 added [ 245.073534][ T8043] device hsr_slave_0 entered promiscuous mode [ 245.140479][ T8043] device hsr_slave_1 entered promiscuous mode 10:56:13 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') clone(0x8000000000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rmdir(&(0x7f0000000140)='./file1\x00') [ 245.203272][ T8048] IPVS: ftp: loaded support on port[0] = 21 [ 245.237788][ T8046] chnl_net:caif_netlink_parms(): no params data found [ 245.263541][ T8043] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.270635][ T8043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.277908][ T8043] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.284985][ T8043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.520854][ T8046] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.528075][ T8046] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.561030][ T8046] device bridge_slave_0 entered promiscuous mode [ 245.601161][ T8046] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.608364][ T8046] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.641036][ T8046] device bridge_slave_1 entered promiscuous mode [ 245.664045][ T8043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.798046][ T8048] chnl_net:caif_netlink_parms(): no params data found [ 245.853861][ T8046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.871820][ T8046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 245.876395][ T8075] IPVS: ftp: loaded support on port[0] = 21 [ 245.903646][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.930306][ T3007] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.970339][ T3007] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.981042][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 246.054667][ T8046] team0: Port device team_slave_0 added [ 246.092041][ T8043] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.102441][ T8046] team0: Port device team_slave_1 added [ 246.198701][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.220675][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.250674][ T8074] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.257777][ T8074] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB], 0x2, 0x0) inotify_init() ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000004c0)=""/214) r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000700)=ANY=[], 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) r1 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="612759b3a88fde133914d7855ab9b0d2fa746851f38267b1b23920fea9d6190b3a933e2e3e7937f63fb618b6db0855cdc6a5d48c47ebfaed", 0x38, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'l\xff\x01', 0x3}, &(0x7f0000000240)='\xd1?.\xf3\xd7', r1) [ 246.306345][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.332224][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.380797][ T8074] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.387865][ T8074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.448846][ T8048] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.480260][ T8048] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.511890][ T8048] device bridge_slave_0 entered promiscuous mode [ 246.543034][ T8048] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.572187][ T8048] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.600300][ T8048] device bridge_slave_1 entered promiscuous mode [ 246.663002][ T8046] device hsr_slave_0 entered promiscuous mode [ 246.710810][ T8046] device hsr_slave_1 entered promiscuous mode [ 246.750209][ T8046] debugfs: Directory 'hsr0' with parent '/' already present! [ 246.778911][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.817993][ T8048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.851611][ T8048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.897098][ T8082] IPVS: ftp: loaded support on port[0] = 21 [ 246.940272][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.949452][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.992685][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.014011][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 247.043142][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.057496][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 10:56:15 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='veth0_to_bond\x00', 0x323) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0xe, &(0x7f00000000c0), 0x4) [ 247.078464][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.109231][ T8043] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 247.131536][ T8043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 247.143538][ T8048] team0: Port device team_slave_0 added [ 247.152234][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 247.178170][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.189081][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.208313][ T8048] team0: Port device team_slave_1 added [ 247.259914][ T8043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 247.339548][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 247.348642][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.412959][ T8048] device hsr_slave_0 entered promiscuous mode [ 247.480463][ T8048] device hsr_slave_1 entered promiscuous mode [ 247.510257][ T8048] debugfs: Directory 'hsr0' with parent '/' already present! [ 247.566688][ T8075] chnl_net:caif_netlink_parms(): no params data found [ 247.569506][ T8099] IPVS: ftp: loaded support on port[0] = 21 [ 247.945087][ T8075] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.966979][ T8075] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.010871][ T8075] device bridge_slave_0 entered promiscuous mode [ 248.038305][ T8075] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.099873][ T8075] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.144752][ T8075] device bridge_slave_1 entered promiscuous mode [ 248.199962][ T8046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.253823][ T8137] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 248.292422][ T8137] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 248.360163][ T8137] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 248.437936][ T8075] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.611495][ T8048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.621963][ T8046] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.672208][ T8075] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.705641][ T8082] chnl_net:caif_netlink_parms(): no params data found [ 248.739555][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.756844][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.813020][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.853407][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.893921][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.900999][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.974137][ T8048] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.034580][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.043527][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.080867][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.098806][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.120699][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.139454][ T8081] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.146608][ T8081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.195530][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.226066][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.258664][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.288480][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.321319][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.340620][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 10:56:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x126}}, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) writev(r2, &(0x7f00000004c0)=[{&(0x7f00000002c0)="408a2f8ce1c03a2eb716bb5f2f46cd1bc2c95c51096e7808daa659510434fd7ca8292cafba22dd032eebc9197910022e064bacaf0bb271d28b16a29dd238bf23f8eb51b94b5635a33a17c805d5035a29dbe4c53232265c57e2684d909de1b87a03663df795bbcb53c6fe1d281fca6bd3771cc9753f44ab50240a0cb21c71e89294", 0x81}, {&(0x7f0000000380)="39aed5ee0eeb9a751cdec683a943e1782a624e2842a391f87a3acd54d97c558581cd340332c30ea5adaf207657f67d65db346f1d05494dc6c6ab84dde61340c5ef02e4a0fb1d36cffb03c02b1c9fd07e941d31e6c5ca174b2cb09a8b1aebd8c7fb9fba5dd6561a3d5ea6b74dae7bb0e54d80b334", 0x74}, {&(0x7f0000000240)}, {&(0x7f0000000400)="e6133d39ceb4f80ea493e41bf10e1c8f63253c761d6c8976b63224b4c7e1a9e7c91b5134f27b8bfec3bb6ca9447314b7253cd2026a1650b00bc20dd69ee2fd98d969b9499c67518ca2d692a86d7e6182ec86a13ba56492ca94740d87ce3941a1bda6ede3914a1166e02e4f45f46be199476e5216e5cc143683de4783420906571b24e6643da470da27", 0x89}], 0x4) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x126}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r5}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x34, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x28, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x21}]}}}]}, 0x54}}, 0x0) [ 249.379757][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.402679][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.430293][ T8099] chnl_net:caif_netlink_parms(): no params data found [ 249.472674][ T8046] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 249.505862][ T8046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 249.538312][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.556174][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.593146][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.634451][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.641818][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.711944][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.759560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.799963][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.807061][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.869831][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.917943][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.966961][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.004112][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.062215][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.108372][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.172569][ T8075] team0: Port device team_slave_0 added [ 250.178351][ T8082] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.198526][ T8082] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.237966][ T8082] device bridge_slave_0 entered promiscuous mode [ 250.278923][ T8148] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 250.324655][ T8148] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 250.344868][ T8148] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 250.397622][ T8048] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 250.450278][ T8048] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 250.489859][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 10:56:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x126}}, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) writev(r2, &(0x7f00000004c0)=[{&(0x7f00000002c0)="408a2f8ce1c03a2eb716bb5f2f46cd1bc2c95c51096e7808daa659510434fd7ca8292cafba22dd032eebc9197910022e064bacaf0bb271d28b16a29dd238bf23f8eb51b94b5635a33a17c805d5035a29dbe4c53232265c57e2684d909de1b87a03663df795bbcb53c6fe1d281fca6bd3771cc9753f44ab50240a0cb21c71e89294", 0x81}, {&(0x7f0000000380)="39aed5ee0eeb9a751cdec683a943e1782a624e2842a391f87a3acd54d97c558581cd340332c30ea5adaf207657f67d65db346f1d05494dc6c6ab84dde61340c5ef02e4a0fb1d36cffb03c02b1c9fd07e941d31e6c5ca174b2cb09a8b1aebd8c7fb9fba5dd6561a3d5ea6b74dae7bb0e54d80b334", 0x74}, {&(0x7f0000000240)}, {&(0x7f0000000400)="e6133d39ceb4f80ea493e41bf10e1c8f63253c761d6c8976b63224b4c7e1a9e7c91b5134f27b8bfec3bb6ca9447314b7253cd2026a1650b00bc20dd69ee2fd98d969b9499c67518ca2d692a86d7e6182ec86a13ba56492ca94740d87ce3941a1bda6ede3914a1166e02e4f45f46be199476e5216e5cc143683de4783420906571b24e6643da470da27", 0x89}], 0x4) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x126}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r5}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x34, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x28, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x21}]}}}]}, 0x54}}, 0x0) [ 250.504376][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.536950][ T8140] ================================================================== [ 250.545092][ T8140] BUG: KCSAN: data-race in d_lru_del / dput [ 250.550985][ T8140] [ 250.553325][ T8140] write to 0xffff888124032480 of 4 bytes by task 8130 on cpu 0: [ 250.560970][ T8140] d_lru_del+0x5d/0xf0 [ 250.565051][ T8140] select_collect+0x179/0x1a0 [ 250.569734][ T8140] d_walk+0x1b1/0x520 [ 250.573725][ T8140] shrink_dcache_parent+0xa4/0x280 [ 250.578837][ T8140] d_invalidate+0x85/0x180 [ 250.583305][ T8140] proc_flush_task+0x14c/0x2e0 [ 250.588075][ T8140] release_task+0x83/0xc60 [ 250.592501][ T8140] wait_consider_task+0x190e/0x1a10 [ 250.597707][ T8140] do_wait+0x1c9/0x4c0 [ 250.601781][ T8140] kernel_wait4+0x156/0x240 [ 250.606289][ T8140] __do_sys_wait4+0xea/0x100 [ 250.610885][ T8140] __x64_sys_wait4+0x5e/0x80 [ 250.615492][ T8140] do_syscall_64+0xcc/0x370 [ 250.619998][ T8140] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 250.625880][ T8140] [ 250.628223][ T8140] read to 0xffff888124032480 of 4 bytes by task 8140 on cpu 1: [ 250.635776][ T8140] dput+0x4d/0x750 [ 250.639509][ T8140] __fput+0x2ac/0x520 [ 250.643502][ T8140] ____fput+0x1f/0x30 [ 250.647490][ T8140] task_work_run+0xf6/0x130 [ 250.652008][ T8140] exit_to_usermode_loop+0x2b4/0x2c0 [ 250.657309][ T8140] do_syscall_64+0x353/0x370 [ 250.661915][ T8140] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 250.667803][ T8140] [ 250.670133][ T8140] Reported by Kernel Concurrency Sanitizer on: [ 250.676292][ T8140] CPU: 1 PID: 8140 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 250.683053][ T8140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.693117][ T8140] ================================================================== [ 250.701181][ T8140] Kernel panic - not syncing: panic_on_warn set ... [ 250.707782][ T8140] CPU: 1 PID: 8140 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 250.714573][ T8140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.724630][ T8140] Call Trace: [ 250.727930][ T8140] dump_stack+0xf5/0x159 [ 250.732170][ T8140] panic+0x210/0x640 [ 250.736153][ T8140] ? vprintk_func+0x8d/0x140 [ 250.740729][ T8140] kcsan_report.cold+0xc/0xe [ 250.745311][ T8140] kcsan_setup_watchpoint+0x3fe/0x410 [ 250.750668][ T8140] __tsan_read4+0x145/0x1f0 [ 250.755155][ T8140] dput+0x4d/0x750 [ 250.758874][ T8140] ? ima_file_free+0x92/0x290 [ 250.763546][ T8140] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 250.769425][ T8140] __fput+0x2ac/0x520 [ 250.773397][ T8140] ____fput+0x1f/0x30 [ 250.777401][ T8140] task_work_run+0xf6/0x130 [ 250.781909][ T8140] exit_to_usermode_loop+0x2b4/0x2c0 [ 250.787181][ T8140] do_syscall_64+0x353/0x370 [ 250.791762][ T8140] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 250.797662][ T8140] RIP: 0033:0x7ff6178822b0 [ 250.802067][ T8140] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 250.821666][ T8140] RSP: 002b:00007fff3aac67b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 250.830080][ T8140] RAX: 0000000000000000 RBX: 00007ff617f37010 RCX: 00007ff6178822b0 [ 250.838058][ T8140] RDX: 0000000000020000 RSI: 00007ff617f37010 RDI: 0000000000000006 [ 250.846015][ T8140] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007ff617b4a55f [ 250.853968][ T8140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 250.861972][ T8140] R13: 0000000000000006 R14: 00007ff617f37010 R15: 0000000000000000 [ 250.871250][ T8140] Kernel Offset: disabled [ 250.875613][ T8140] Rebooting in 86400 seconds..