[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.761530][ T26] audit: type=1800 audit(1570700616.483:25): pid=7083 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 41.795888][ T26] audit: type=1800 audit(1570700616.483:26): pid=7083 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 41.833469][ T26] audit: type=1800 audit(1570700616.483:27): pid=7083 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.40' (ECDSA) to the list of known hosts. 2019/10/10 09:43:47 fuzzer started 2019/10/10 09:43:49 dialing manager at 10.128.0.105:34287 2019/10/10 09:43:49 syscalls: 2523 2019/10/10 09:43:49 code coverage: enabled 2019/10/10 09:43:49 comparison tracing: enabled 2019/10/10 09:43:49 extra coverage: extra coverage is not supported by the kernel 2019/10/10 09:43:49 setuid sandbox: enabled 2019/10/10 09:43:49 namespace sandbox: enabled 2019/10/10 09:43:49 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/10 09:43:49 fault injection: enabled 2019/10/10 09:43:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/10 09:43:49 net packet injection: enabled 2019/10/10 09:43:49 net device setup: enabled 2019/10/10 09:43:49 concurrency sanitizer: enabled 09:43:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) syzkaller login: [ 57.721021][ T7256] IPVS: ftp: loaded support on port[0] = 21 [ 57.808159][ T7256] chnl_net:caif_netlink_parms(): no params data found [ 57.848030][ T7256] bridge0: port 1(bridge_slave_0) entered blocking state 09:43:52 executing program 1: syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) inotify_init1(0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9000000, 0x0, 0x0, 0x0, 0x6400}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 57.855311][ T7256] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.865783][ T7256] device bridge_slave_0 entered promiscuous mode [ 57.875496][ T7256] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.883935][ T7256] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.892423][ T7256] device bridge_slave_1 entered promiscuous mode [ 57.915116][ T7256] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.927114][ T7256] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.954684][ T7256] team0: Port device team_slave_0 added [ 57.962323][ T7256] team0: Port device team_slave_1 added [ 58.039027][ T7256] device hsr_slave_0 entered promiscuous mode [ 58.107137][ T7256] device hsr_slave_1 entered promiscuous mode 09:43:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x8) [ 58.172703][ T7259] IPVS: ftp: loaded support on port[0] = 21 [ 58.178927][ T7256] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.186064][ T7256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.193417][ T7256] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.200538][ T7256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.430624][ T7256] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.453013][ T7259] chnl_net:caif_netlink_parms(): no params data found [ 58.481481][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.501686][ T3020] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.521864][ T3020] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.533115][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 58.546729][ T7256] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.572179][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:43:53 executing program 3: socket$kcm(0x11, 0xa, 0x300) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="10"], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x0) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x80080080044df9, &(0x7f0000000040)) syz_open_dev$dspn(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x4}, 0x2c) r4 = socket$inet(0x2, 0x6, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) socket$inet(0x2, 0x0, 0x0) [ 58.582619][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.589719][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.608358][ T7262] IPVS: ftp: loaded support on port[0] = 21 [ 58.634821][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.651546][ T3020] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.658636][ T3020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.670309][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.679256][ T7259] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.688430][ T7259] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.696743][ T7259] device bridge_slave_0 entered promiscuous mode [ 58.713326][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.724505][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.748735][ T7259] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.755791][ T7259] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.764570][ T7259] device bridge_slave_1 entered promiscuous mode [ 58.796141][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.804723][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.861139][ T7259] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.874351][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.895352][ T7259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.918859][ T7256] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.967285][ T7259] team0: Port device team_slave_0 added [ 58.975578][ T7259] team0: Port device team_slave_1 added [ 59.045487][ T7268] IPVS: ftp: loaded support on port[0] = 21 09:43:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) accept4$tipc(r5, &(0x7f0000000700), 0x0, 0x0) r6 = geteuid() r7 = getegid() getresgid(&(0x7f0000000880), &(0x7f00000008c0)=0x0, &(0x7f0000000900)) r9 = socket$inet(0xa, 0x801, 0x84) connect$inet(r9, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r9, 0xfc0004) r10 = accept4(r9, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r10, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r10, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r11 = accept4$nfc_llcp(r10, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0xaafd5cbdb1c7c8ad) fsetxattr$trusted_overlay_origin(r11, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) ioctl$TIOCGSID(r4, 0x5429, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0, 0x0}, &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000001880)=0xc) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000001900)) r13 = gettid() sendmmsg$unix(r5, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="800000001c0000000000000001000000026398010000", @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="000000001c00000000000000010000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000c1781c1b24738d08000100000002000000", @ANYRES32=0x0, @ANYRES32=r12, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb4, 0x4000}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed9942ee14657bdf6224d8eb6b9958612d3cf0a4c4e3f10922e8c6de354421403c2d01b2b7e6fa53ffa7210c8d0b5bcaa7f376d26f49fcef2357b4d7be156eafb98ffd6f0db38d57d32b8525bbd22423e81886f0d97fa934f043fac129e444fe3f49a7e34c91ac4a36cdde22abd4d4a87072beb0b3", 0xb5}, {&(0x7f0000001000)="1aafdb517ccb933795b89218e7709e05c751a5", 0x13}, {0x0}], 0x3, &(0x7f00000010c0), 0x0, 0x4000004}, {&(0x7f0000001100)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001580), 0x0, 0x0, 0x0, 0x44081}, {&(0x7f0000001a80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001b00), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="2000000088970fa1764e63eeafd667b1f4972f354a3cf108b274b4fc3796f73e32907dfa61b4b77361af9297110cc734c1784f9ec0f5daab80957a79", @ANYRES32=r3, @ANYRES32=r5, @ANYRES32, @ANYRES32=r5, @ANYRES32=r5, @ANYRES32=r3, @ANYBLOB="1c00000000004ee3d80000f9813cb800040000", @ANYRES32=r13, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x73, 0x4048850}], 0x4, 0x20000000) r14 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r14, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0xe1) [ 59.099161][ T7259] device hsr_slave_0 entered promiscuous mode [ 59.136369][ T7259] device hsr_slave_1 entered promiscuous mode [ 59.206020][ T7259] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.265046][ T7262] chnl_net:caif_netlink_parms(): no params data found [ 59.324598][ T7259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.383732][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 59.395461][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.404777][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.421628][ T7259] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.468131][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.497369][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.505881][ T3020] bridge0: port 1(bridge_slave_0) entered blocking state 09:43:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 59.512953][ T3020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.528967][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.538389][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.548079][ T3020] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.555177][ T3020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.568054][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 09:43:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 59.624676][ T7259] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 59.639020][ T7259] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 59.660392][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:43:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 59.674216][ T7278] IPVS: ftp: loaded support on port[0] = 21 [ 59.683845][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.710331][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.730857][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.753383][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 09:43:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 59.775834][ T7262] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.786387][ T7262] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.804313][ T7262] device bridge_slave_0 entered promiscuous mode [ 59.851186][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.859389][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.889891][ T7262] bridge0: port 2(bridge_slave_1) entered blocking state 09:43:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 59.906181][ T7262] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.925543][ T7262] device bridge_slave_1 entered promiscuous mode [ 59.937253][ T7268] chnl_net:caif_netlink_parms(): no params data found 09:43:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 60.031181][ T7262] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.054634][ T7262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.148665][ T7268] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.151503][ T7292] IPVS: ftp: loaded support on port[0] = 21 [ 60.155834][ T7268] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.174743][ T7268] device bridge_slave_0 entered promiscuous mode [ 60.183660][ T7262] team0: Port device team_slave_0 added 09:43:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 60.201811][ T7262] team0: Port device team_slave_1 added [ 60.215745][ T7259] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.243781][ T7268] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.252170][ T7268] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.268369][ T7268] device bridge_slave_1 entered promiscuous mode 09:43:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 60.419137][ T7262] device hsr_slave_0 entered promiscuous mode [ 60.456349][ T7262] device hsr_slave_1 entered promiscuous mode [ 60.506233][ T7262] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.517358][ T7268] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.531352][ T7268] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.631951][ T7268] team0: Port device team_slave_0 added [ 60.640208][ T7268] team0: Port device team_slave_1 added [ 60.677100][ T7278] chnl_net:caif_netlink_parms(): no params data found [ 60.718450][ T7268] device hsr_slave_0 entered promiscuous mode [ 60.766360][ T7268] device hsr_slave_1 entered promiscuous mode [ 60.774844][ T7313] ================================================================== [ 60.783010][ T7313] BUG: KCSAN: data-race in __splice_from_pipe / pipe_poll [ 60.790104][ T7313] [ 60.792412][ T7313] read to 0xffff888103d126f8 of 4 bytes by task 7312 on cpu 0: [ 60.800058][ T7313] pipe_poll+0x84/0x1d0 [ 60.804198][ T7313] do_select+0x7d0/0x1020 [ 60.808510][ T7313] core_sys_select+0x38b/0x520 [ 60.813255][ T7313] __x64_sys_pselect6+0x22a/0x280 [ 60.818259][ T7313] do_syscall_64+0xcf/0x2f0 [ 60.822743][ T7313] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 60.828607][ T7313] [ 60.830915][ T7313] write to 0xffff888103d126f8 of 4 bytes by task 7313 on cpu 1: [ 60.838521][ T7313] __splice_from_pipe+0x3ce/0x480 [ 60.843523][ T7313] do_vmsplice.part.0+0x1c5/0x210 [ 60.848525][ T7313] __do_sys_vmsplice+0x15f/0x1c0 [ 60.853435][ T7313] __x64_sys_vmsplice+0x5e/0x80 [ 60.858263][ T7313] do_syscall_64+0xcf/0x2f0 [ 60.862784][ T7313] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 60.868643][ T7313] [ 60.870985][ T7313] Reported by Kernel Concurrency Sanitizer on: [ 60.877134][ T7313] CPU: 1 PID: 7313 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 60.884573][ T7313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.894601][ T7313] ================================================================== [ 60.902636][ T7313] Kernel panic - not syncing: panic_on_warn set ... [ 60.909199][ T7313] CPU: 1 PID: 7313 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 60.916623][ T7313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.926666][ T7313] Call Trace: [ 60.929938][ T7313] dump_stack+0xf5/0x159 [ 60.934158][ T7313] panic+0x209/0x639 [ 60.938031][ T7313] ? vprintk_func+0x8d/0x140 [ 60.942602][ T7313] kcsan_report.cold+0xc/0x1b [ 60.947257][ T7313] __kcsan_setup_watchpoint+0x3ee/0x510 [ 60.952797][ T7313] __tsan_write4+0x32/0x40 [ 60.957191][ T7313] __splice_from_pipe+0x3ce/0x480 [ 60.962193][ T7313] ? iter_to_pipe+0x3f0/0x3f0 [ 60.966851][ T7313] do_vmsplice.part.0+0x1c5/0x210 [ 60.971866][ T7313] __do_sys_vmsplice+0x15f/0x1c0 [ 60.976790][ T7313] ? __tsan_read8+0x2c/0x30 [ 60.981274][ T7313] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 60.986971][ T7313] ? __kcsan_setup_watchpoint+0x96/0x510 [ 60.992578][ T7313] ? _copy_to_user+0x84/0xb0 [ 60.997145][ T7313] ? __kcsan_setup_watchpoint+0x96/0x510 [ 61.002751][ T7313] ? __kcsan_setup_watchpoint+0x96/0x510 [ 61.008365][ T7313] __x64_sys_vmsplice+0x5e/0x80 [ 61.013196][ T7313] do_syscall_64+0xcf/0x2f0 [ 61.017680][ T7313] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.023545][ T7313] RIP: 0033:0x459a59 [ 61.027422][ T7313] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 61.047000][ T7313] RSP: 002b:00007fdfc507bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 61.055384][ T7313] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a59 [ 61.063353][ T7313] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000007 [ 61.071302][ T7313] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 61.079247][ T7313] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdfc507c6d4 [ 61.087196][ T7313] R13: 00000000004c94e5 R14: 00000000004e0c68 R15: 00000000ffffffff [ 61.096585][ T7313] Kernel Offset: disabled [ 61.100909][ T7313] Rebooting in 86400 seconds..