[info] Using makefile-style concurrent boot in runlevel 2. [ 41.546714][ T26] audit: type=1800 audit(1574979256.285:21): pid=7478 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 41.598695][ T26] audit: type=1800 audit(1574979256.285:22): pid=7478 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.122' (ECDSA) to the list of known hosts. 2019/11/28 22:14:27 fuzzer started 2019/11/28 22:14:29 dialing manager at 10.128.0.105:46851 2019/11/28 22:14:29 syscalls: 2589 2019/11/28 22:14:29 code coverage: enabled 2019/11/28 22:14:29 comparison tracing: enabled 2019/11/28 22:14:29 extra coverage: extra coverage is not supported by the kernel 2019/11/28 22:14:29 setuid sandbox: enabled 2019/11/28 22:14:29 namespace sandbox: enabled 2019/11/28 22:14:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/28 22:14:29 fault injection: enabled 2019/11/28 22:14:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/28 22:14:29 net packet injection: enabled 2019/11/28 22:14:29 net device setup: enabled 2019/11/28 22:14:29 concurrency sanitizer: enabled 2019/11/28 22:14:29 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/28 22:14:31 adding functions to KCSAN blacklist: 'blk_mq_dispatch_rq_list' 'tomoyo_supervisor' 'wbt_done' 'tcp_add_backlog' 'ext4_free_inode' 'find_next_bit' '__hrtimer_run_queues' 'ep_poll' 'wbt_issue' 'ext4_has_free_clusters' 'pipe_poll' 22:14:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r1, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r2}, 0x30) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f0000000380)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r6) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fchown(r8, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000c40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r7}}}, @cred={{0x1c}}], 0x80, 0x4}, 0x0) r9 = getpid() sched_setscheduler(r9, 0x0, &(0x7f0000000380)) socket(0x0, 0x0, 0x0) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) r10 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r10, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) fcntl$getown(r10, 0x9) getegid() lstat(0x0, &(0x7f0000000b00)) getgroups(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x0, 0x27b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x0, 0x0, 0x0, 0x32c5, 0x2, 0x8, 0x0, 0x0, 0x5, 0x6, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba", 0x0}, 0x20) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000001380), 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, r11, 0x0, 0xffffffffffffffff, 0x9) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x8000, 0x0, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x5, 0x0, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x0, 0x0, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x8, 0x0, 0x9ba1}, r12, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r12, &(0x7f0000000200), 0x0}, 0x20) pipe(0x0) r13 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r13, 0x0, 0x0) getuid() getegid() getgroups(0x0, 0x0) r14 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r14, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) getuid() lstat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) getpid() setuid(0x0) lstat(0x0, &(0x7f0000000b00)) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x2, 0x0) setuid(0x0) r15 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r15, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80)}, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000005440)=@nfc_llcp, &(0x7f00000054c0)=0x80, 0xd4eccfdaf51b3321) 22:14:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syzkaller login: [ 62.380832][ T7652] IPVS: ftp: loaded support on port[0] = 21 [ 62.468281][ T7652] chnl_net:caif_netlink_parms(): no params data found [ 62.536474][ T7652] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.543567][ T7652] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.551799][ T7652] device bridge_slave_0 entered promiscuous mode [ 62.565556][ T7652] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.572703][ T7652] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.581204][ T7652] device bridge_slave_1 entered promiscuous mode [ 62.600367][ T7652] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.615995][ T7655] IPVS: ftp: loaded support on port[0] = 21 [ 62.626500][ T7652] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:14:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r0) close(r1) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") close(r1) [ 62.655988][ T7652] team0: Port device team_slave_0 added [ 62.662611][ T7652] team0: Port device team_slave_1 added [ 62.786918][ T7652] device hsr_slave_0 entered promiscuous mode [ 62.815211][ T7652] device hsr_slave_1 entered promiscuous mode 22:14:37 executing program 3: getpid() ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x0, 0x0, 0x20, 0x0, 0x0, 0x20000}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) [ 62.913561][ T7658] IPVS: ftp: loaded support on port[0] = 21 [ 62.924498][ T7655] chnl_net:caif_netlink_parms(): no params data found [ 63.025244][ T7652] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.032310][ T7652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.039615][ T7652] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.046676][ T7652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.202624][ T7655] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.210381][ T7655] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.245365][ T7655] device bridge_slave_0 entered promiscuous mode [ 63.268665][ T7655] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.305021][ T7655] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.312771][ T7655] device bridge_slave_1 entered promiscuous mode [ 63.400996][ T7684] IPVS: ftp: loaded support on port[0] = 21 [ 63.412455][ T7655] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.446773][ T7655] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.487370][ T3515] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.516186][ T3515] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.581660][ T7655] team0: Port device team_slave_0 added [ 63.629775][ T7655] team0: Port device team_slave_1 added 22:14:38 executing program 4: set_mempolicy(0x4001, &(0x7f0000000000)=0x6c554818, 0x5) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000180)='X', 0x1, r0) keyctl$clear(0x7, r0) [ 63.708514][ T7652] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.787299][ T7655] device hsr_slave_0 entered promiscuous mode [ 63.835142][ T7655] device hsr_slave_1 entered promiscuous mode [ 63.854954][ T7655] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.871140][ T7652] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.929590][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.938441][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.977421][ T7658] chnl_net:caif_netlink_parms(): no params data found [ 64.015362][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.024141][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.075393][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.082492][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.145507][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.175411][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.206231][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.213293][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.246293][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.394094][ T7652] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 64.454934][ T7652] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.508251][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.527178][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 22:14:39 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2c, r1, 0xef25ffae36cdbba1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x2c}}, 0x0) [ 64.573345][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.614014][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.639542][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.667316][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.687136][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.715865][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.735415][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.767854][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.787509][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.819672][ T7684] chnl_net:caif_netlink_parms(): no params data found [ 64.853749][ T7688] IPVS: ftp: loaded support on port[0] = 21 [ 64.877478][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 64.887263][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 64.899492][ T7714] IPVS: ftp: loaded support on port[0] = 21 [ 64.982043][ T7652] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.996191][ T7658] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.003307][ T7658] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.063438][ T7658] device bridge_slave_0 entered promiscuous mode [ 65.129344][ T7658] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.150225][ T7658] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.174993][ T7658] device bridge_slave_1 entered promiscuous mode [ 65.239128][ T7684] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.261176][ T7684] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.294986][ T7684] device bridge_slave_0 entered promiscuous mode [ 65.315429][ T7684] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.322482][ T7684] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.355645][ T7684] device bridge_slave_1 entered promiscuous mode [ 65.412593][ T7658] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.502010][ T7658] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.528749][ T7684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.582423][ T7688] chnl_net:caif_netlink_parms(): no params data found [ 65.604682][ T7684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.694919][ T7684] team0: Port device team_slave_0 added [ 65.699757][ C0] hrtimer: interrupt took 34844 ns [ 65.704488][ T7658] team0: Port device team_slave_0 added [ 65.717510][ T7714] chnl_net:caif_netlink_parms(): no params data found [ 65.743485][ T7658] team0: Port device team_slave_1 added [ 65.762920][ T7684] team0: Port device team_slave_1 added [ 65.773900][ T7688] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.803000][ T7688] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.813171][ T7688] device bridge_slave_0 entered promiscuous mode [ 65.821657][ T7688] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.844936][ T7688] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.852851][ T7688] device bridge_slave_1 entered promiscuous mode [ 65.990220][ T7658] device hsr_slave_0 entered promiscuous mode [ 66.045233][ T7658] device hsr_slave_1 entered promiscuous mode [ 66.077655][ T7658] debugfs: Directory 'hsr0' with parent '/' already present! 22:14:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r1, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r2}, 0x30) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f0000000380)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r6) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fchown(r8, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000c40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r7}}}, @cred={{0x1c}}], 0x80, 0x4}, 0x0) r9 = getpid() sched_setscheduler(r9, 0x0, &(0x7f0000000380)) socket(0x0, 0x0, 0x0) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) r10 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r10, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) fcntl$getown(r10, 0x9) getegid() lstat(0x0, &(0x7f0000000b00)) getgroups(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x0, 0x27b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x0, 0x0, 0x0, 0x32c5, 0x2, 0x8, 0x0, 0x0, 0x5, 0x6, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba", 0x0}, 0x20) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000001380), 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, r11, 0x0, 0xffffffffffffffff, 0x9) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x8000, 0x0, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x5, 0x0, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x0, 0x0, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x8, 0x0, 0x9ba1}, r12, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r12, &(0x7f0000000200), 0x0}, 0x20) pipe(0x0) r13 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r13, 0x0, 0x0) getuid() getegid() getgroups(0x0, 0x0) r14 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r14, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) getuid() lstat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) getpid() setuid(0x0) lstat(0x0, &(0x7f0000000b00)) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x2, 0x0) setuid(0x0) r15 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r15, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80)}, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000005440)=@nfc_llcp, &(0x7f00000054c0)=0x80, 0xd4eccfdaf51b3321) [ 66.139813][ T7684] device hsr_slave_0 entered promiscuous mode [ 66.185163][ T7684] device hsr_slave_1 entered promiscuous mode [ 66.225242][ T7684] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.238321][ T7714] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.245630][ T7714] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.253406][ T7714] device bridge_slave_0 entered promiscuous mode [ 66.266645][ T7688] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.290387][ T7655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.297852][ T7714] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.305376][ T7714] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.313333][ T7714] device bridge_slave_1 entered promiscuous mode [ 66.353951][ T7688] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.402482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.427930][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.483984][ T7655] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.539526][ T7714] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.611945][ T7688] team0: Port device team_slave_0 added [ 66.625989][ T7688] team0: Port device team_slave_1 added [ 66.693470][ T7714] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.773695][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.808960][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.895383][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.902573][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.955328][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.964084][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 22:14:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r1, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r2}, 0x30) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f0000000380)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r6) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fchown(r8, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000c40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r7}}}, @cred={{0x1c}}], 0x80, 0x4}, 0x0) r9 = getpid() sched_setscheduler(r9, 0x0, &(0x7f0000000380)) socket(0x0, 0x0, 0x0) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) r10 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r10, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) fcntl$getown(r10, 0x9) getegid() lstat(0x0, &(0x7f0000000b00)) getgroups(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x0, 0x27b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x0, 0x0, 0x0, 0x32c5, 0x2, 0x8, 0x0, 0x0, 0x5, 0x6, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba", 0x0}, 0x20) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000001380), 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, r11, 0x0, 0xffffffffffffffff, 0x9) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x8000, 0x0, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x5, 0x0, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x0, 0x0, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x8, 0x0, 0x9ba1}, r12, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r12, &(0x7f0000000200), 0x0}, 0x20) pipe(0x0) r13 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r13, 0x0, 0x0) getuid() getegid() getgroups(0x0, 0x0) r14 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r14, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) getuid() lstat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) getpid() setuid(0x0) lstat(0x0, &(0x7f0000000b00)) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x2, 0x0) setuid(0x0) r15 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r15, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80)}, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000005440)=@nfc_llcp, &(0x7f00000054c0)=0x80, 0xd4eccfdaf51b3321) [ 67.045264][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.052327][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.135471][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.262570][ T7714] team0: Port device team_slave_0 added [ 67.315289][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.324034][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.379477][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.435585][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 22:14:42 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r1, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r2}, 0x30) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f0000000380)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r6) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fchown(r8, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000c40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r7}}}, @cred={{0x1c}}], 0x80, 0x4}, 0x0) r9 = getpid() sched_setscheduler(r9, 0x0, &(0x7f0000000380)) socket(0x0, 0x0, 0x0) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) r10 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r10, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) fcntl$getown(r10, 0x9) getegid() lstat(0x0, &(0x7f0000000b00)) getgroups(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x0, 0x27b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x0, 0x0, 0x0, 0x32c5, 0x2, 0x8, 0x0, 0x0, 0x5, 0x6, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba", 0x0}, 0x20) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000001380), 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, r11, 0x0, 0xffffffffffffffff, 0x9) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x8000, 0x0, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x5, 0x0, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x0, 0x0, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x8, 0x0, 0x9ba1}, r12, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r12, &(0x7f0000000200), 0x0}, 0x20) pipe(0x0) r13 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r13, 0x0, 0x0) getuid() getegid() getgroups(0x0, 0x0) r14 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r14, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) getuid() lstat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) getpid() setuid(0x0) lstat(0x0, &(0x7f0000000b00)) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x2, 0x0) setuid(0x0) r15 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r15, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80)}, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000005440)=@nfc_llcp, &(0x7f00000054c0)=0x80, 0xd4eccfdaf51b3321) [ 67.477102][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.533787][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.595972][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.604293][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.687086][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.704676][ T7658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.797151][ T7688] device hsr_slave_0 entered promiscuous mode [ 67.848384][ T7688] device hsr_slave_1 entered promiscuous mode [ 67.925568][ T7688] debugfs: Directory 'hsr0' with parent '/' already present! [ 67.936566][ T7714] team0: Port device team_slave_1 added [ 67.944779][ T7655] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.965692][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.017504][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.055532][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.099466][ T7658] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.142122][ T7684] 8021q: adding VLAN 0 to HW filter on device bond0 22:14:42 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r1, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r2}, 0x30) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f0000000380)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r6) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fchown(r8, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000c40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r7}}}, @cred={{0x1c}}], 0x80, 0x4}, 0x0) r9 = getpid() sched_setscheduler(r9, 0x0, &(0x7f0000000380)) socket(0x0, 0x0, 0x0) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) r10 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r10, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) fcntl$getown(r10, 0x9) getegid() lstat(0x0, &(0x7f0000000b00)) getgroups(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x0, 0x27b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x0, 0x0, 0x0, 0x32c5, 0x2, 0x8, 0x0, 0x0, 0x5, 0x6, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba", 0x0}, 0x20) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000001380), 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, r11, 0x0, 0xffffffffffffffff, 0x9) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x8000, 0x0, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x5, 0x0, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x0, 0x0, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x8, 0x0, 0x9ba1}, r12, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r12, &(0x7f0000000200), 0x0}, 0x20) pipe(0x0) r13 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r13, 0x0, 0x0) getuid() getegid() getgroups(0x0, 0x0) r14 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r14, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) getuid() lstat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) getpid() setuid(0x0) lstat(0x0, &(0x7f0000000b00)) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x2, 0x0) setuid(0x0) r15 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r15, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80)}, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000005440)=@nfc_llcp, &(0x7f00000054c0)=0x80, 0xd4eccfdaf51b3321) [ 68.265559][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.273392][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.359368][ T7684] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.431096][ T7714] device hsr_slave_0 entered promiscuous mode [ 68.495357][ T7714] device hsr_slave_1 entered promiscuous mode [ 68.554974][ T7714] debugfs: Directory 'hsr0' with parent '/' already present! [ 68.598956][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.635762][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.644357][ T7783] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.651443][ T7783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.826340][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.834063][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.925488][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.933630][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 22:14:43 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r1, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r2}, 0x30) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f0000000380)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r6) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fchown(r8, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000c40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r7}}}, @cred={{0x1c}}], 0x80, 0x4}, 0x0) r9 = getpid() sched_setscheduler(r9, 0x0, &(0x7f0000000380)) socket(0x0, 0x0, 0x0) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) r10 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r10, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) fcntl$getown(r10, 0x9) getegid() lstat(0x0, &(0x7f0000000b00)) getgroups(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x0, 0x27b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x0, 0x0, 0x0, 0x32c5, 0x2, 0x8, 0x0, 0x0, 0x5, 0x6, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba", 0x0}, 0x20) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000001380), 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, r11, 0x0, 0xffffffffffffffff, 0x9) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x8000, 0x0, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x5, 0x0, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x0, 0x0, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x8, 0x0, 0x9ba1}, r12, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r12, &(0x7f0000000200), 0x0}, 0x20) pipe(0x0) r13 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r13, 0x0, 0x0) getuid() getegid() getgroups(0x0, 0x0) r14 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r14, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) getuid() lstat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) getpid() setuid(0x0) lstat(0x0, &(0x7f0000000b00)) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x2, 0x0) setuid(0x0) r15 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r15, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80)}, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000005440)=@nfc_llcp, &(0x7f00000054c0)=0x80, 0xd4eccfdaf51b3321) [ 69.025140][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.090050][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.169163][ T7783] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.176510][ T7783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.265383][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.274626][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.370192][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.425774][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.434846][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.555531][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.658001][ T7655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.686643][ T7658] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 69.734955][ T7658] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 69.868160][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.900682][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 22:14:44 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r1, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r2}, 0x30) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f0000000380)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r6) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fchown(r8, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000c40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r7}}}, @cred={{0x1c}}], 0x80, 0x4}, 0x0) r9 = getpid() sched_setscheduler(r9, 0x0, &(0x7f0000000380)) socket(0x0, 0x0, 0x0) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) r10 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r10, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) fcntl$getown(r10, 0x9) getegid() lstat(0x0, &(0x7f0000000b00)) getgroups(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x0, 0x27b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x0, 0x0, 0x0, 0x32c5, 0x2, 0x8, 0x0, 0x0, 0x5, 0x6, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba", 0x0}, 0x20) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000001380), 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, r11, 0x0, 0xffffffffffffffff, 0x9) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x8000, 0x0, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x5, 0x0, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x0, 0x0, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x8, 0x0, 0x9ba1}, r12, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r12, &(0x7f0000000200), 0x0}, 0x20) pipe(0x0) r13 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r13, 0x0, 0x0) getuid() getegid() getgroups(0x0, 0x0) r14 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r14, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) getuid() lstat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) getpid() setuid(0x0) lstat(0x0, &(0x7f0000000b00)) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x2, 0x0) setuid(0x0) r15 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r15, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80)}, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000005440)=@nfc_llcp, &(0x7f00000054c0)=0x80, 0xd4eccfdaf51b3321) [ 69.962081][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.015543][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.053169][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.060269][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.136329][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.188524][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.217055][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.224112][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.302270][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.355557][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.378756][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.425422][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.433841][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.506119][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.566292][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.605280][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.688706][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.715755][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.731122][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.749456][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.812578][ T7658] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.880945][ T7684] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.932055][ T7684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 22:14:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r1, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r2}, 0x30) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f0000000380)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r6) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fchown(r8, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000c40)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r7}}}, @cred={{0x1c}}], 0x80, 0x4}, 0x0) r9 = getpid() sched_setscheduler(r9, 0x0, &(0x7f0000000380)) socket(0x0, 0x0, 0x0) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) r10 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r10, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) fcntl$getown(r10, 0x9) getegid() lstat(0x0, &(0x7f0000000b00)) getgroups(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x0, 0x27b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x0, 0x0, 0x0, 0x32c5, 0x2, 0x8, 0x0, 0x0, 0x5, 0x6, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba", 0x0}, 0x20) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000001380), 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, r11, 0x0, 0xffffffffffffffff, 0x9) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x8000, 0x0, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x0, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffdc81, 0x2, 0x5, 0x0, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x0, 0x0, 0x0, 0x7fff, 0x10001, 0x81, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x8, 0x0, 0x9ba1}, r12, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r12, &(0x7f0000000200), 0x0}, 0x20) pipe(0x0) r13 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r13, 0x0, 0x0) getuid() getegid() getgroups(0x0, 0x0) r14 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r14, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b", 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) getuid() lstat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x80, 0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)}, 0x0) getpid() setuid(0x0) lstat(0x0, &(0x7f0000000b00)) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x2, 0x0) setuid(0x0) r15 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r15, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80)}, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000005440)=@nfc_llcp, &(0x7f00000054c0)=0x80, 0xd4eccfdaf51b3321) [ 71.002813][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.011310][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.078479][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.130833][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.173095][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.208724][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.259140][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.368267][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.396465][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.433521][ T7684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.471855][ T7688] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.549766][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.565578][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.623866][ T7688] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.651754][ T7714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.759408][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.788840][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.861467][ T3017] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.868577][ T3017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.929426][ T7844] ================================================================== [ 71.937580][ T7844] BUG: KCSAN: data-race in common_perm_cond / task_dump_owner [ 71.945022][ T7844] [ 71.947441][ T7844] read to 0xffff88812890382c of 4 bytes by task 7852 on cpu 0: [ 71.955118][ T7844] common_perm_cond+0x65/0x110 [ 71.958271][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.960321][ T7844] apparmor_inode_getattr+0x2b/0x40 [ 71.973727][ T7844] security_inode_getattr+0x9b/0xd0 [ 71.978951][ T7844] vfs_getattr+0x2e/0x70 [ 71.983203][ T7844] vfs_statx+0x102/0x190 [ 71.987448][ T7844] __do_sys_newstat+0x51/0xb0 [ 71.992123][ T7844] __x64_sys_newstat+0x3a/0x50 [ 71.996972][ T7844] do_syscall_64+0xcc/0x370 [ 72.001474][ T7844] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.007378][ T7844] [ 72.009711][ T7844] write to 0xffff88812890382c of 4 bytes by task 7844 on cpu 1: [ 72.017338][ T7844] task_dump_owner+0xd8/0x260 [ 72.020068][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.022039][ T7844] pid_update_inode+0x3c/0x70 [ 72.035011][ T7844] pid_revalidate+0x91/0xd0 [ 72.039513][ T7844] lookup_fast+0x6f2/0x700 [ 72.043926][ T7844] walk_component+0x6d/0xe70 [ 72.048516][ T7844] link_path_walk.part.0+0x5d3/0xa90 [ 72.053797][ T7844] path_openat+0x14f/0x36e0 [ 72.058304][ T7844] do_filp_open+0x11e/0x1b0 [ 72.062829][ T7844] do_sys_open+0x3b3/0x4f0 [ 72.065470][ T3017] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.067253][ T7844] __x64_sys_open+0x55/0x70 [ 72.067269][ T7844] do_syscall_64+0xcc/0x370 [ 72.067284][ T7844] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.067294][ T7844] [ 72.074488][ T3017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.078954][ T7844] Reported by Kernel Concurrency Sanitizer on: [ 72.078972][ T7844] CPU: 1 PID: 7844 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 72.078981][ T7844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.078994][ T7844] ================================================================== [ 72.132022][ T7844] Kernel panic - not syncing: panic_on_warn set ... [ 72.138606][ T7844] CPU: 1 PID: 7844 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 72.145885][ T7844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.156026][ T7844] Call Trace: [ 72.159339][ T7844] dump_stack+0x11d/0x181 [ 72.163664][ T7844] panic+0x210/0x640 [ 72.167569][ T7844] ? vprintk_func+0x8d/0x140 [ 72.172157][ T7844] kcsan_report.cold+0xc/0xd [ 72.176759][ T7844] kcsan_setup_watchpoint+0x3fe/0x460 [ 72.182130][ T7844] __tsan_unaligned_write4+0xc4/0x100 [ 72.187495][ T7844] task_dump_owner+0xd8/0x260 [ 72.192188][ T7844] ? __rcu_read_unlock+0x66/0x3c0 [ 72.197231][ T7844] pid_update_inode+0x3c/0x70 [ 72.201902][ T7844] pid_revalidate+0x91/0xd0 [ 72.206415][ T7844] lookup_fast+0x6f2/0x700 [ 72.210830][ T7844] walk_component+0x6d/0xe70 [ 72.215416][ T7844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 72.221651][ T7844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 72.227887][ T7844] ? security_inode_permission+0xa5/0xc0 [ 72.233513][ T7844] ? inode_permission+0xa0/0x3c0 [ 72.238977][ T7844] link_path_walk.part.0+0x5d3/0xa90 [ 72.244296][ T7844] path_openat+0x14f/0x36e0 [ 72.248815][ T7844] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 72.254706][ T7844] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 72.260939][ T7844] ? __rcu_read_unlock+0x66/0x3c0 [ 72.265968][ T7844] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 72.271853][ T7844] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 72.277834][ T7844] ? __read_once_size+0x41/0xe0 [ 72.282683][ T7844] do_filp_open+0x11e/0x1b0 [ 72.287276][ T7844] ? __alloc_fd+0x2ef/0x3b0 [ 72.291780][ T7844] do_sys_open+0x3b3/0x4f0 [ 72.296200][ T7844] __x64_sys_open+0x55/0x70 [ 72.300715][ T7844] do_syscall_64+0xcc/0x370 [ 72.305227][ T7844] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.311107][ T7844] RIP: 0033:0x7fe23d2d5120 [ 72.315521][ T7844] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 72.335507][ T7844] RSP: 002b:00007ffdcb4263c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 72.344007][ T7844] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fe23d2d5120 [ 72.352213][ T7844] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fe23d7a3d00 [ 72.360189][ T7844] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007fe23d59da10 [ 72.368166][ T7844] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe23d7a2d00 [ 72.376215][ T7844] R13: 0000000001cfc1c0 R14: 0000000000000005 R15: 0000000000000000 [ 72.385617][ T7844] Kernel Offset: disabled [ 72.390013][ T7844] Rebooting in 86400 seconds..