[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 34.349104][ T26] audit: type=1800 audit(1571136463.346:25): pid=7033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 34.399100][ T26] audit: type=1800 audit(1571136463.346:26): pid=7033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 34.432368][ T26] audit: type=1800 audit(1571136463.346:27): pid=7033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.16' (ECDSA) to the list of known hosts. 2019/10/15 10:47:50 fuzzer started 2019/10/15 10:47:51 dialing manager at 10.128.0.105:38903 2019/10/15 10:47:51 checking machine... 2019/10/15 10:47:51 checking revisions... 2019/10/15 10:47:51 testing simple program... syzkaller login: [ 43.006577][ T7200] IPVS: ftp: loaded support on port[0] = 21 2019/10/15 10:47:52 building call list... executing program [ 46.762682][ T7184] can: request_module (can-proto-0) failed. [ 46.775474][ T7184] can: request_module (can-proto-0) failed. 2019/10/15 10:47:57 syscalls: 2523 2019/10/15 10:47:57 code coverage: enabled 2019/10/15 10:47:57 comparison tracing: enabled 2019/10/15 10:47:57 extra coverage: extra coverage is not supported by the kernel 2019/10/15 10:47:57 setuid sandbox: enabled 2019/10/15 10:47:57 namespace sandbox: enabled 2019/10/15 10:47:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/15 10:47:57 fault injection: enabled 2019/10/15 10:47:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/15 10:47:57 net packet injection: enabled 2019/10/15 10:47:57 net device setup: enabled 2019/10/15 10:47:57 concurrency sanitizer: enabled 10:47:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) [ 49.951860][ T7243] IPVS: ftp: loaded support on port[0] = 21 10:47:59 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x28d) sendmmsg(r1, &(0x7f00000096c0)=[{{0x0, 0x900, 0x0}}, {{&(0x7f0000002440)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x2}}, 0x80, 0x0}}], 0x2, 0x0) [ 50.044924][ T7243] chnl_net:caif_netlink_parms(): no params data found [ 50.091810][ T7243] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.117841][ T7243] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.129860][ T7243] device bridge_slave_0 entered promiscuous mode [ 50.138169][ T7243] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.146744][ T7243] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.162581][ T7243] device bridge_slave_1 entered promiscuous mode [ 50.218779][ T7243] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.243356][ T7243] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.275414][ T7243] team0: Port device team_slave_0 added [ 50.282688][ T7243] team0: Port device team_slave_1 added [ 50.344774][ T7243] device hsr_slave_0 entered promiscuous mode 10:47:59 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$sndmidi(0x0, 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f000000ad80)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="8a5d717d76fa70a7c8635437f3fa8ab0b6e9b621cb2619f4436a295c026920d7e4e1161bf78ad7eceee50a9a896ffab0910a77bb8aa7e97f266e44a16d716289df3de041aa3b836274cae963bc1321815ad77fb24cbb0f891fecb5a843d98cd05681c8978f386c78a2da7fc42ac584c71e115fb5a726c7d5fd71b32f6c3cdb9710f3a950632cbf442076b8a621ffabb98cb97a34b944923c2225b4b8833e764ea56017fcad075b458e094f54067a5370196e77a94262999760984a5418df48296c5adc07bdef6b", 0xc7}, {&(0x7f0000000300)="c611e3b367d592c45401277b9f027fd7f6519f570066d7308f0e5984b976982531be5ac0308fb86d7c543236f4619936d05d072af77a6ea1309a18f1bfd93aff269c1cb897f5ed435202f59e3a2282964738b4aa87375cde57c314d7bda0955531ccb5125f4fd40aa651ac3689400a5cb0149084db99c6f0fba5a5a80dd9c368ee0e856075ce6987fda6b8c71a05f8be52", 0x91}, {&(0x7f00000003c0)}], 0x3, &(0x7f00000004c0)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x7f}}, @mark={{0x14, 0x1, 0x24, 0xffff}}, @mark={{0x14, 0x1, 0x24, 0xff}}], 0x78}}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000600)="eb21fcb36fc621c97151a3171006850b3848fba66d7253e54693b14d7f3a7ee1b9365042b25b48cd2cdd3e53bc43575ae92067a37e4c360bd80ba36f5f2a70c3ebbaa34e3503", 0x46}, {0x0}, {0x0}], 0x3, &(0x7f0000001a80)=[@timestamping={{0x14, 0x1, 0x25, 0x200}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0xffffffff80000000}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x50e}}, @txtime={{0x18}}, @txtime={{0x18}}], 0xa8}}], 0x2, 0x40000) sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x1) fcntl$setstatus(r4, 0x4, 0x102800) write(r4, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r4, r3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, 0x0, 0x3, 0x243, 0x1f}) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r1, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x8, 0x9e, 0x1}, 0x120) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) [ 50.412663][ T7243] device hsr_slave_1 entered promiscuous mode [ 50.501118][ T7243] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.508321][ T7243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.515682][ T7243] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.523555][ T7243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.545323][ T7247] IPVS: ftp: loaded support on port[0] = 21 [ 50.608460][ T7243] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.637771][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.653805][ T2618] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.682250][ T2618] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.693994][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.706687][ T7243] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.728269][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.733385][ T7249] IPVS: ftp: loaded support on port[0] = 21 [ 50.738577][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.749280][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.787333][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.797151][ T3513] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.804255][ T3513] bridge0: port 2(bridge_slave_1) entered forwarding state 10:47:59 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) io_setup(0x8, &(0x7f00004eb000)=0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r1, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) io_getevents(0x0, 0x0, 0x0, 0x0, &(0x7f00009ca000)={0x0, 0x1c9c380}) memfd_create(&(0x7f00006a7000)='/dev/vga_arbiter\x00', 0x0) r3 = memfd_create(&(0x7f00006a7000)='/dev/vga_arbiter\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f00008feff8)='net/udp\x00') sendfile(r3, r4, 0x0, 0x1) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000001240)={0x6, &(0x7f0000001200)=[{}, {}, {}, {}, {}, {}]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) io_cancel(r1, 0x0, &(0x7f00000011c0)) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x20000) [ 50.859443][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.869243][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.930156][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.947109][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.975680][ T7247] chnl_net:caif_netlink_parms(): no params data found [ 50.995275][ T7243] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 51.011654][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.033150][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.166173][ T7249] chnl_net:caif_netlink_parms(): no params data found [ 51.189432][ T7247] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.202408][ T7247] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.213041][ T7247] device bridge_slave_0 entered promiscuous mode [ 51.235999][ T7254] IPVS: ftp: loaded support on port[0] = 21 [ 51.242723][ T7243] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.264194][ T7247] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.271276][ T7247] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.282426][ T7247] device bridge_slave_1 entered promiscuous mode [ 51.327243][ T7247] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.341475][ T7249] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.349418][ T7249] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.358499][ T7249] device bridge_slave_0 entered promiscuous mode 10:48:00 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x8, 0x0, &(0x7f0000000680)=[@increfs], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000000680)=[@increfs, @increfs={0x40046307}], 0x0, 0x0, 0x0}) [ 51.369960][ T7247] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.386761][ T7249] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.394148][ T7249] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.402662][ T7249] device bridge_slave_1 entered promiscuous mode [ 51.443501][ T7247] team0: Port device team_slave_0 added [ 51.465512][ T7249] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.475835][ T7247] team0: Port device team_slave_1 added [ 51.527195][ T7249] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.612198][ T7254] chnl_net:caif_netlink_parms(): no params data found 10:48:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) [ 51.724769][ T7247] device hsr_slave_0 entered promiscuous mode [ 51.762058][ T7247] device hsr_slave_1 entered promiscuous mode [ 51.808979][ T7247] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.817689][ T7249] team0: Port device team_slave_0 added 10:48:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) [ 51.867877][ T7249] team0: Port device team_slave_1 added [ 51.883945][ T7247] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.891018][ T7247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.898377][ T7247] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.905462][ T7247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.939037][ T7254] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.954114][ T7254] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.972203][ T7254] device bridge_slave_0 entered promiscuous mode [ 52.005442][ T7268] IPVS: ftp: loaded support on port[0] = 21 [ 52.016132][ T7254] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.024921][ T7254] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.036942][ T7254] device bridge_slave_1 entered promiscuous mode [ 52.049265][ T7247] 8021q: adding VLAN 0 to HW filter on device bond0 10:48:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 10:48:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) [ 52.094626][ T7249] device hsr_slave_0 entered promiscuous mode [ 52.132039][ T7249] device hsr_slave_1 entered promiscuous mode [ 52.205908][ T7249] debugfs: Directory 'hsr0' with parent '/' already present! [ 52.235254][ T7247] 8021q: adding VLAN 0 to HW filter on device team0 10:48:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) [ 52.251785][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.260512][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.280218][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.292730][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 52.364686][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.375300][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.402175][ T12] bridge0: port 1(bridge_slave_0) entered blocking state 10:48:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) [ 52.409687][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.417927][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.426977][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.436188][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.443614][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.465374][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.482991][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.495355][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 10:48:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) [ 52.518301][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.539824][ T7249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.553525][ T7254] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.587550][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.597002][ T7285] IPVS: ftp: loaded support on port[0] = 21 [ 52.609436][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.632697][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.653717][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.662554][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.676763][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 10:48:01 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb], 0x0, 0x80000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0, @ANYBLOB="7c9d01dcf1a6688a95b52d6f48df5d069d5ad66cd4ad14e35bbaeaeec69dae4057fb6a6913602e1a406dd4c1"], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 52.697449][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.707593][ T7247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.726021][ T7249] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.744128][ T7297] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 52.744659][ T7254] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.814070][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.826602][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.888330][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.897120][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.905950][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.913062][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.921135][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.930846][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.939421][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.946823][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.955130][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.964313][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.973946][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.983117][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.000684][ T7249] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.013610][ T7249] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.055476][ T7254] team0: Port device team_slave_0 added [ 53.067135][ T7254] team0: Port device team_slave_1 added [ 53.074091][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.084158][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.102765][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.112034][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.121122][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.130454][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.142211][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.150689][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.159349][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.168719][ T7247] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.272470][ T7268] chnl_net:caif_netlink_parms(): no params data found [ 53.334119][ T7254] device hsr_slave_0 entered promiscuous mode [ 53.371926][ T7254] device hsr_slave_1 entered promiscuous mode [ 53.421697][ T7254] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.483575][ T7285] chnl_net:caif_netlink_parms(): no params data found [ 53.500846][ T7249] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.548620][ T7268] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.562438][ T7268] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.575002][ T7268] device bridge_slave_0 entered promiscuous mode 10:48:02 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x28d) sendmmsg(r1, &(0x7f00000096c0)=[{{0x0, 0x900, 0x0}}, {{&(0x7f0000002440)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x2}}, 0x80, 0x0}}], 0x2, 0x0) [ 53.593822][ T7268] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.601003][ T7268] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.615884][ T7268] device bridge_slave_1 entered promiscuous mode [ 53.692503][ T7285] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.710743][ T7285] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.732315][ T7285] device bridge_slave_0 entered promiscuous mode [ 53.749016][ T7268] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.767677][ T7254] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.781235][ T7285] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.788989][ T7285] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.802328][ T7285] device bridge_slave_1 entered promiscuous mode [ 53.811005][ T7268] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.825218][ T7254] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.850502][ T7295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.873340][ T7295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.921455][ T7285] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.944460][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.973825][ C1] hrtimer: interrupt took 33298 ns [ 53.994047][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.019516][ T7246] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.026622][ T7246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.171059][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.179984][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.189091][ T7246] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.196268][ T7246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.205277][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.214779][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.224869][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.234759][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.244805][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 10:48:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb], 0x0, 0x80000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0, @ANYBLOB="7c9d01dcf1a6688a95b52d6f48df5d069d5ad66cd4ad14e35bbaeaeec69dae4057fb6a6913602e1a406dd4c1"], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 54.269711][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.299516][ T7285] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.324977][ T7254] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.337858][ T7254] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.354951][ T3991] ================================================================== [ 54.363094][ T3991] BUG: KCSAN: data-race in generic_permission / kernfs_refresh_inode [ 54.371147][ T3991] [ 54.373476][ T3991] write to 0xffff88812a7e76d8 of 2 bytes by task 3990 on cpu 1: [ 54.381101][ T3991] kernfs_refresh_inode+0x44/0x180 [ 54.386222][ T3991] kernfs_iop_permission+0x66/0xa0 [ 54.391329][ T3991] inode_permission+0x241/0x3c0 [ 54.396170][ T3991] link_path_walk.part.0+0x622/0xa90 [ 54.401439][ T3991] path_lookupat.isra.0+0x77/0x5a0 [ 54.406541][ T3991] filename_lookup+0x145/0x2d0 [ 54.411389][ T3991] user_path_at_empty+0x4c/0x70 [ 54.416225][ T3991] vfs_statx+0xd9/0x190 [ 54.420365][ T3991] __do_sys_newlstat+0x51/0xb0 [ 54.425202][ T3991] __x64_sys_newlstat+0x3a/0x50 [ 54.430040][ T3991] do_syscall_64+0xcf/0x2f0 [ 54.434532][ T3991] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 54.440400][ T3991] [ 54.442721][ T3991] read to 0xffff88812a7e76d8 of 2 bytes by task 3991 on cpu 0: [ 54.450594][ T3991] generic_permission+0x36/0x3d0 [ 54.455522][ T3991] kernfs_iop_permission+0x7d/0xa0 [ 54.460625][ T3991] inode_permission+0x241/0x3c0 [ 54.465477][ T3991] link_path_walk.part.0+0x622/0xa90 [ 54.470749][ T3991] path_openat+0x14f/0x3530 [ 54.475239][ T3991] do_filp_open+0x11e/0x1b0 [ 54.479762][ T3991] do_sys_open+0x3b3/0x4f0 [ 54.484167][ T3991] __x64_sys_open+0x55/0x70 [ 54.488742][ T3991] do_syscall_64+0xcf/0x2f0 [ 54.493232][ T3991] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 54.499102][ T3991] [ 54.501424][ T3991] Reported by Kernel Concurrency Sanitizer on: [ 54.507564][ T3991] CPU: 0 PID: 3991 Comm: udevd Not tainted 5.3.0+ #0 [ 54.514222][ T3991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.524261][ T3991] ================================================================== [ 54.532309][ T3991] Kernel panic - not syncing: panic_on_warn set ... [ 54.538880][ T3991] CPU: 0 PID: 3991 Comm: udevd Not tainted 5.3.0+ #0 [ 54.545634][ T3991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.555672][ T3991] Call Trace: [ 54.558950][ T3991] dump_stack+0xf5/0x159 [ 54.563186][ T3991] panic+0x209/0x639 [ 54.567072][ T3991] ? do_syscall_64+0xcf/0x2f0 [ 54.571737][ T3991] ? vprintk_func+0x8d/0x140 [ 54.576336][ T3991] kcsan_report.cold+0xc/0x1b [ 54.581007][ T3991] __kcsan_setup_watchpoint+0x3ee/0x510 [ 54.586558][ T3991] __tsan_read2+0x2c/0x30 [ 54.590877][ T3991] generic_permission+0x36/0x3d0 [ 54.595806][ T3991] ? kernfs_refresh_inode+0x14e/0x180 [ 54.601172][ T3991] kernfs_iop_permission+0x7d/0xa0 [ 54.606276][ T3991] ? kernfs_iop_getattr+0x90/0x90 [ 54.611284][ T3991] inode_permission+0x241/0x3c0 [ 54.616126][ T3991] link_path_walk.part.0+0x622/0xa90 [ 54.621405][ T3991] path_openat+0x14f/0x3530 [ 54.625900][ T3991] ? debug_smp_processor_id+0x4c/0x172 [ 54.631360][ T3991] ? __tsan_read8+0x2c/0x30 [ 54.635850][ T3991] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.641483][ T3991] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.647116][ T3991] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.652827][ T3991] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.658454][ T3991] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 54.664340][ T3991] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.669961][ T3991] do_filp_open+0x11e/0x1b0 [ 54.674461][ T3991] ? __alloc_fd+0x316/0x4c0 [ 54.678960][ T3991] do_sys_open+0x3b3/0x4f0 [ 54.683371][ T3991] __x64_sys_open+0x55/0x70 [ 54.687863][ T3991] do_syscall_64+0xcf/0x2f0 [ 54.692360][ T3991] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 54.698235][ T3991] RIP: 0033:0x7f7b50b58120 [ 54.702642][ T3991] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 54.722231][ T3991] RSP: 002b:00007ffcaf708558 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 54.730630][ T3991] RAX: ffffffffffffffda RBX: 0000000001c04e80 RCX: 00007f7b50b58120 [ 54.738610][ T3991] RDX: 00000000000001b6 RSI: 0000000000080000 RDI: 00007ffcaf708630 [ 54.746567][ T3991] RBP: 00007ffcaf7085d0 R08: 0000000000000008 R09: 0000000000000001 [ 54.754524][ T3991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 54.762480][ T3991] R13: 000000000041f57a R14: 0000000001bec250 R15: 000000000000000b [ 54.774414][ T3991] Kernel Offset: disabled [ 54.778735][ T3991] Rebooting in 86400 seconds..