[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 40.249803][ T26] audit: type=1800 audit(1572772980.164:25): pid=7054 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 40.287471][ T26] audit: type=1800 audit(1572772980.164:26): pid=7054 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 40.320702][ T26] audit: type=1800 audit(1572772980.164:27): pid=7054 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.9' (ECDSA) to the list of known hosts. 2019/11/03 09:23:11 fuzzer started 2019/11/03 09:23:12 dialing manager at 10.128.0.105:43165 2019/11/03 09:23:14 syscalls: 2554 2019/11/03 09:23:14 code coverage: enabled 2019/11/03 09:23:14 comparison tracing: enabled 2019/11/03 09:23:14 extra coverage: extra coverage is not supported by the kernel 2019/11/03 09:23:14 setuid sandbox: enabled 2019/11/03 09:23:14 namespace sandbox: enabled 2019/11/03 09:23:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 09:23:14 fault injection: enabled 2019/11/03 09:23:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 09:23:14 net packet injection: enabled 2019/11/03 09:23:14 net device setup: enabled 2019/11/03 09:23:14 concurrency sanitizer: enabled 09:23:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 09:23:15 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x7fff}], 0x1) syzkaller login: [ 55.493646][ T7226] IPVS: ftp: loaded support on port[0] = 21 [ 55.626263][ T7226] chnl_net:caif_netlink_parms(): no params data found [ 55.702828][ T7226] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.710088][ T7226] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.733158][ T7226] device bridge_slave_0 entered promiscuous mode [ 55.740794][ T7226] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.749247][ T7226] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.757857][ T7226] device bridge_slave_1 entered promiscuous mode [ 55.780528][ T7226] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.791436][ T7226] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:23:15 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x512, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 55.817804][ T7226] team0: Port device team_slave_0 added [ 55.824910][ T7226] team0: Port device team_slave_1 added [ 55.829915][ T7229] IPVS: ftp: loaded support on port[0] = 21 [ 55.885355][ T7226] device hsr_slave_0 entered promiscuous mode [ 55.922622][ T7226] device hsr_slave_1 entered promiscuous mode [ 56.025687][ T7231] IPVS: ftp: loaded support on port[0] = 21 [ 56.106309][ T7226] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.113528][ T7226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.120829][ T7226] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.128627][ T7226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.447910][ T7226] 8021q: adding VLAN 0 to HW filter on device bond0 09:23:16 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f00000001c0)=""/148, 0x20000254) [ 56.523780][ T7226] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.531732][ T7229] chnl_net:caif_netlink_parms(): no params data found [ 56.574800][ T2826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.583463][ T2826] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.654240][ T2826] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.665156][ T2826] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 56.775612][ T2826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.794440][ T2826] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.801657][ T2826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.854522][ T2826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.882836][ T2826] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.889964][ T2826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.054397][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.083336][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.115060][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.143589][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.174847][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.203267][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.251645][ T7231] chnl_net:caif_netlink_parms(): no params data found [ 57.290087][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.300981][ T7259] IPVS: ftp: loaded support on port[0] = 21 [ 57.333908][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.375465][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.398449][ T7226] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 57.436040][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.469991][ T7229] bridge0: port 1(bridge_slave_0) entered blocking state 09:23:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x304, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x24, 0x0, &(0x7f0000000100)) fcntl$getflags(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x12, r4, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8002, 0x0) write$sndseq(r5, &(0x7f0000000000)=[{0x5b93, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, 0x0) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getegid() fcntl$getownex(r6, 0x10, &(0x7f0000000a80)={0x0, 0x0}) lstat(&(0x7f0000000b80)='./file0\x00', 0x0) r8 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) lstat(0x0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r8, 0x0, r9) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c001200000000000100dd0002000000", @ANYRES32=r7, @ANYRES32, @ANYBLOB="000000001c000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32], 0x40, 0x4}, 0x6010) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) geteuid() openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x80401, 0x0) geteuid() r10 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r10, 0x4, 0x42000) r11 = getegid() fcntl$getownex(r10, 0x10, &(0x7f0000000a80)={0x0, 0x0}) lstat(0x0, 0x0) lstat(0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000c40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r11, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r12, @ANYRES32, @ANYBLOB="000000001c000000", @ANYRES32=0x0, @ANYRES32=r13, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x54, 0x4}, 0x6010) r14 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8002, 0x0) write$sndseq(r14, &(0x7f0000000000)=[{0x5b93, 0x0, 0xffffffffffffff80, 0x0, @tick, {}, {}, @connect}], 0x30) getsockopt$inet_IP_XFRM_POLICY(r14, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@empty, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) lstat(0x0, &(0x7f00000017c0)) getgroups(0x1, &(0x7f00000000c0)=[0x0]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) lstat(0x0, &(0x7f0000000bc0)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) getegid() lstat(0x0, 0x0) lstat(0x0, &(0x7f00000017c0)) geteuid() open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{0x0}, {&(0x7f00000005c0)="2919da6b1a29", 0x6}, {0x0}, {&(0x7f0000000700)="8e01364aa70818cbf626a37fcfa2270baff3d5e2cb6b0bada6c69f072980e53f814ae0e21a482618037c48c5912a9f3f77946116a4ed", 0x36}], 0x4, &(0x7f0000000c40)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYBLOB="00150000"], 0x44, 0x4}, 0x6010) getgroups(0x1, &(0x7f00000000c0)=[0x0]) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x80401, 0x0) getegid() lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000300)}, {0x0}, {&(0x7f00000005c0)="2919da6b1a29b57e", 0x8}, {0x0}, {&(0x7f0000000700)="8e01364aa70818cbf626a37fcfa2270baff3d5e2cb6b0bada6c69f072980e53f814ae0e21a482618037c48c5912a9f3f77946116a4ed98", 0x37}], 0x5, &(0x7f0000000c40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000140000000000", @ANYRES32, @ANYRES32, @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x3f, 0x4}, 0x6010) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB="00000000140000000000", @ANYBLOB="000000001c001200000000000100dd0002000000", @ANYRES32, @ANYBLOB="000000001c000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00'], 0x48, 0x4}, 0x6010) getegid() fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) getegid() [ 57.502451][ T7229] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.532260][ T7229] device bridge_slave_0 entered promiscuous mode [ 57.573434][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 57.593605][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.646432][ T7229] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.662271][ T7229] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.670287][ T7229] device bridge_slave_1 entered promiscuous mode [ 57.797233][ T7231] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.833098][ T7231] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.863860][ T7231] device bridge_slave_0 entered promiscuous mode [ 57.896094][ T7226] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.925182][ T7229] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.977159][ T7231] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.003873][ T7231] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.011813][ T7231] device bridge_slave_1 entered promiscuous mode [ 58.113936][ T7231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.143803][ T7229] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.180839][ T7231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.194874][ T7266] IPVS: ftp: loaded support on port[0] = 21 [ 58.304886][ T7229] team0: Port device team_slave_0 added [ 58.325446][ T7229] team0: Port device team_slave_1 added [ 58.344371][ T7231] team0: Port device team_slave_0 added 09:23:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) io_setup(0x4, &(0x7f0000000500)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) io_submit(r2, 0x1ffffd0a, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0}]) [ 58.373260][ T7231] team0: Port device team_slave_1 added [ 58.475431][ T7229] device hsr_slave_0 entered promiscuous mode [ 58.504719][ T7229] device hsr_slave_1 entered promiscuous mode [ 58.562312][ T7229] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.718039][ T7231] device hsr_slave_0 entered promiscuous mode [ 58.792627][ T7231] device hsr_slave_1 entered promiscuous mode [ 58.822434][ T7231] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.922065][ T7278] IPVS: ftp: loaded support on port[0] = 21 [ 58.959088][ T7266] chnl_net:caif_netlink_parms(): no params data found [ 59.304062][ T7259] chnl_net:caif_netlink_parms(): no params data found [ 59.673016][ T7266] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.680101][ T7266] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.747786][ T7266] device bridge_slave_0 entered promiscuous mode [ 59.795074][ T7259] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.802143][ T7259] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.853510][ T7259] device bridge_slave_0 entered promiscuous mode [ 59.894296][ T7259] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.932328][ T7259] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.993396][ T7259] device bridge_slave_1 entered promiscuous mode [ 60.036146][ T7229] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.066209][ T7266] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.080304][ T7266] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.128315][ T7266] device bridge_slave_1 entered promiscuous mode [ 60.244125][ T7231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.259914][ T7229] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.331873][ T2826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.351487][ T2826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:23:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') [ 60.472240][ T7231] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.524347][ T7259] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.562981][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.571071][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.614100][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.652794][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.696102][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.703206][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.779455][ T7259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.804081][ T7266] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.863452][ T7266] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.923668][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.943291][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.987383][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.024524][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.031661][ T7261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.087460][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.124266][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.160483][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.167625][ T7261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.223120][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.308299][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.336556][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.385962][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.420016][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.479460][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.523687][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.567806][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.615111][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.658958][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.704206][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.747919][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.755081][ T7261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.191758][ T7278] chnl_net:caif_netlink_parms(): no params data found [ 62.276942][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.289654][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.331408][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.386685][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.435398][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.470642][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.511231][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.552164][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.573106][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.590863][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.600438][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.610541][ T7266] team0: Port device team_slave_0 added [ 62.627640][ T7259] team0: Port device team_slave_0 added [ 62.638213][ T7231] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.666601][ T7231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:23:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') [ 62.726093][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.745133][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.773031][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.786244][ T7259] team0: Port device team_slave_1 added [ 62.812118][ T7266] team0: Port device team_slave_1 added [ 62.857474][ T7229] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.878594][ T7278] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.888010][ T7278] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.899324][ T7278] device bridge_slave_0 entered promiscuous mode [ 62.925793][ T7231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.942994][ T7278] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.952417][ T7278] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.961352][ T7278] device bridge_slave_1 entered promiscuous mode [ 63.025592][ T7266] device hsr_slave_0 entered promiscuous mode [ 63.062661][ T7266] device hsr_slave_1 entered promiscuous mode [ 63.102563][ T7266] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.165210][ T7259] device hsr_slave_0 entered promiscuous mode [ 63.202641][ T7259] device hsr_slave_1 entered promiscuous mode [ 63.242283][ T7259] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.259293][ T7278] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.486364][ T7278] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:23:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') [ 63.740025][ T7278] team0: Port device team_slave_0 added [ 63.855757][ T7278] team0: Port device team_slave_1 added [ 64.141887][ T7266] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.187762][ T7401] ================================================================== [ 64.195902][ T7401] BUG: KCSAN: data-race in task_dump_owner / task_dump_owner [ 64.203354][ T7401] [ 64.205684][ T7401] write to 0xffff888124109acc of 4 bytes by task 7403 on cpu 0: [ 64.213320][ T7401] task_dump_owner+0x237/0x260 [ 64.218087][ T7401] pid_update_inode+0x3c/0x70 [ 64.222766][ T7401] pid_revalidate+0x91/0xd0 [ 64.227273][ T7401] lookup_fast+0x6f2/0x700 [ 64.231688][ T7401] walk_component+0x6d/0xe80 [ 64.236366][ T7401] link_path_walk.part.0+0x5d3/0xa90 [ 64.241650][ T7401] path_openat+0x14f/0x36e0 [ 64.246342][ T7401] do_filp_open+0x11e/0x1b0 [ 64.250845][ T7401] do_sys_open+0x3b3/0x4f0 [ 64.255263][ T7401] __x64_sys_open+0x55/0x70 [ 64.259771][ T7401] do_syscall_64+0xcc/0x370 [ 64.264367][ T7401] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 64.270248][ T7401] [ 64.272586][ T7401] write to 0xffff888124109acc of 4 bytes by task 7401 on cpu 1: [ 64.280222][ T7401] task_dump_owner+0x237/0x260 [ 64.285105][ T7401] pid_update_inode+0x3c/0x70 [ 64.289785][ T7401] pid_revalidate+0x91/0xd0 [ 64.294344][ T7401] lookup_fast+0x6f2/0x700 [ 64.298768][ T7401] walk_component+0x6d/0xe80 [ 64.303356][ T7401] link_path_walk.part.0+0x5d3/0xa90 [ 64.308640][ T7401] path_openat+0x14f/0x36e0 [ 64.313138][ T7401] do_filp_open+0x11e/0x1b0 [ 64.317640][ T7401] do_sys_open+0x3b3/0x4f0 [ 64.322051][ T7401] __x64_sys_open+0x55/0x70 [ 64.326560][ T7401] do_syscall_64+0xcc/0x370 [ 64.331074][ T7401] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 64.336963][ T7401] [ 64.339285][ T7401] Reported by Kernel Concurrency Sanitizer on: [ 64.345442][ T7401] CPU: 1 PID: 7401 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 64.352201][ T7401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.362251][ T7401] ================================================================== [ 64.370570][ T7401] Kernel panic - not syncing: panic_on_warn set ... [ 64.377170][ T7401] CPU: 1 PID: 7401 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 64.383922][ T7401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.394164][ T7401] Call Trace: [ 64.397475][ T7401] dump_stack+0xf5/0x159 [ 64.401726][ T7401] panic+0x210/0x640 [ 64.405780][ T7401] ? do_sys_open+0x3b3/0x4f0 [ 64.410374][ T7401] ? vprintk_func+0x8d/0x140 [ 64.414977][ T7401] kcsan_report.cold+0xc/0x10 [ 64.419663][ T7401] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 64.425209][ T7401] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.430843][ T7401] __tsan_write4+0x32/0x40 [ 64.435268][ T7401] task_dump_owner+0x237/0x260 [ 64.440039][ T7401] ? __rcu_read_unlock+0x66/0x3c0 [ 64.445075][ T7401] pid_update_inode+0x3c/0x70 [ 64.449755][ T7401] pid_revalidate+0x91/0xd0 [ 64.455225][ T7401] lookup_fast+0x6f2/0x700 [ 64.459657][ T7401] walk_component+0x6d/0xe80 [ 64.464343][ T7401] ? __tsan_read8+0x2c/0x30 [ 64.468856][ T7401] ? security_inode_permission+0xa5/0xc0 [ 64.474503][ T7401] link_path_walk.part.0+0x5d3/0xa90 [ 64.479807][ T7401] path_openat+0x14f/0x36e0 [ 64.484320][ T7401] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.489954][ T7401] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.495589][ T7401] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.501223][ T7401] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.506858][ T7401] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.512493][ T7401] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.518216][ T7401] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.523848][ T7401] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.529485][ T7401] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 64.535377][ T7401] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 64.541017][ T7401] do_filp_open+0x11e/0x1b0 [ 64.545529][ T7401] ? __alloc_fd+0x316/0x4c0 [ 64.550043][ T7401] do_sys_open+0x3b3/0x4f0 [ 64.554553][ T7401] __x64_sys_open+0x55/0x70 [ 64.559158][ T7401] do_syscall_64+0xcc/0x370 [ 64.563674][ T7401] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 64.569567][ T7401] RIP: 0033:0x7f9ae8ab1120 [ 64.573987][ T7401] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 64.593594][ T7401] RSP: 002b:00007ffef0b912b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 64.602019][ T7401] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f9ae8ab1120 [ 64.610020][ T7401] RDX: 00007ffef0b912f1 RSI: 0000000000000000 RDI: 00007ffef0b912e0 [ 64.617989][ T7401] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007f9ae8d7955f [ 64.625958][ T7401] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000020b7220 [ 64.633928][ T7401] R13: 0000000000000020 R14: 00007f9ae9166010 R15: 0000000000000000 [ 64.643410][ T7401] Kernel Offset: disabled [ 64.647731][ T7401] Rebooting in 86400 seconds..