[info] Using makefile-style concurrent boot in runlevel 2. [ 43.114083][ T25] audit: type=1800 audit(1575406546.558:21): pid=7477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 43.163509][ T25] audit: type=1800 audit(1575406546.568:22): pid=7477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.127' (ECDSA) to the list of known hosts. 2019/12/03 20:55:57 fuzzer started 2019/12/03 20:55:59 dialing manager at 10.128.0.105:44523 2019/12/03 20:56:03 syscalls: 2684 2019/12/03 20:56:03 code coverage: enabled 2019/12/03 20:56:03 comparison tracing: enabled 2019/12/03 20:56:03 extra coverage: extra coverage is not supported by the kernel 2019/12/03 20:56:03 setuid sandbox: enabled 2019/12/03 20:56:03 namespace sandbox: enabled 2019/12/03 20:56:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 20:56:03 fault injection: enabled 2019/12/03 20:56:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 20:56:03 net packet injection: enabled 2019/12/03 20:56:03 net device setup: enabled 2019/12/03 20:56:03 concurrency sanitizer: enabled 2019/12/03 20:56:03 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 65.689084][ T7645] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/03 20:56:10 adding functions to KCSAN blacklist: 'generic_fillattr' 'tcp_add_backlog' 'ep_poll' 'tick_do_update_jiffies64' 'add_timer' 'bio_endio' 'run_timer_softirq' 'timer_clear_idle' 'do_exit' 'tick_nohz_idle_stop_tick' 'blk_mq_dispatch_rq_list' 'lruvec_lru_size' 'do_signal_stop' 'n_tty_receive_buf_common' 'vm_area_dup' 'tomoyo_check_path_acl' 'ext4_has_free_clusters' 'ext4_free_inodes_count' 'ext4_mb_find_by_goal' 'ext4_free_inode' 'find_get_pages_range_tag' 'dd_has_work' 'do_nanosleep' 'dccp_fin' 'tomoyo_supervisor' 'pipe_poll' 'generic_write_end' 'find_next_bit' 'ext4_nonda_switch' 'pipe_wait' '__snd_rawmidi_transmit_ack' 'wbt_done' 'blk_mq_get_request' 'taskstats_exit' 'mod_timer' 'tick_sched_do_timer' '__ext4_new_inode' 'poll_schedule_timeout' 'futex_wait_queue_me' 'rcu_gp_fqs_check_wake' 'd_delete' 'echo_char' '__hrtimer_run_queues' 'xas_clear_mark' 'blk_mq_sched_dispatch_requests' 'common_perm_cond' 'copy_process' 20:57:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x2}) preadv(r0, &(0x7f0000003280)=[{&(0x7f0000003300)=""/4097, 0x4}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 20:57:12 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = memfd_create(&(0x7f0000000140)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r3 = dup(r2) execveat(r3, 0x0, &(0x7f0000000140), 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x7, 0x8}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={r4, 0x0, 0x32}, 0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fsetxattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000300)='/dev/radio#\x00', 0xc, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) [ 128.521729][ T7648] IPVS: ftp: loaded support on port[0] = 21 [ 128.621115][ T7648] chnl_net:caif_netlink_parms(): no params data found [ 128.686990][ T7648] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.716382][ T7648] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.724026][ T7648] device bridge_slave_0 entered promiscuous mode [ 128.731662][ T7648] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.739243][ T7648] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.746974][ T7648] device bridge_slave_1 entered promiscuous mode [ 128.764757][ T7648] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.766725][ T7651] IPVS: ftp: loaded support on port[0] = 21 20:57:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_genetlink_get_family_id$ipvs(0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) r2 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r3, &(0x7f0000001400)=[{&(0x7f00000010c0)=""/247, 0xf7}], 0x1) ppoll(&(0x7f0000001080)=[{r4}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r3, 0xa, 0x12) dup2(r3, r4) fcntl$setown(r3, 0x8, r2) tkill(r2, 0x15) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) mlockall(0x0) inotify_init1(0x0) alarm(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) [ 128.775105][ T7648] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.799600][ T7648] team0: Port device team_slave_0 added [ 128.808975][ T7648] team0: Port device team_slave_1 added [ 128.877842][ T7648] device hsr_slave_0 entered promiscuous mode [ 128.907470][ T7648] device hsr_slave_1 entered promiscuous mode [ 128.985438][ T7653] IPVS: ftp: loaded support on port[0] = 21 [ 129.016005][ T7648] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.023074][ T7648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.030486][ T7648] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.037636][ T7648] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.207909][ T7651] chnl_net:caif_netlink_parms(): no params data found [ 129.282631][ T7648] 8021q: adding VLAN 0 to HW filter on device bond0 20:57:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffd}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r5 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') sendfile(r4, r5, 0x0, 0x1) [ 129.328396][ T2415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.349324][ T2415] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.397029][ T2415] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.417258][ T2415] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 129.444800][ T7651] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.457239][ T7651] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.497524][ T7651] device bridge_slave_0 entered promiscuous mode [ 129.536373][ T7651] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.543520][ T7651] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.586364][ T7651] device bridge_slave_1 entered promiscuous mode [ 129.623312][ T7648] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.677936][ T7653] chnl_net:caif_netlink_parms(): no params data found [ 129.707961][ T7651] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 129.758557][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.796409][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.826803][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.833950][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.876730][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.906839][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.936541][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.943611][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.987082][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.017139][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 20:57:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r3, 0x0, 0x0, 0x110003) write$cgroup_int(r3, &(0x7f0000000040), 0x12) lseek(r3, 0x0, 0x3) [ 130.047663][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 130.077119][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.108109][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 130.146994][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.178335][ T7651] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 130.201627][ T7683] IPVS: ftp: loaded support on port[0] = 21 [ 130.230785][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 130.246703][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.297694][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.349815][ T7653] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.375831][ T7653] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.383647][ T7653] device bridge_slave_0 entered promiscuous mode [ 130.426398][ T7653] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.433483][ T7653] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.450584][ T7653] device bridge_slave_1 entered promiscuous mode [ 130.465625][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.479232][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.496455][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 130.509496][ T7651] team0: Port device team_slave_0 added [ 130.540210][ T7690] IPVS: ftp: loaded support on port[0] = 21 [ 130.547566][ T7653] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 130.558511][ T7651] team0: Port device team_slave_1 added [ 130.568261][ T7653] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 130.587690][ T7648] 8021q: adding VLAN 0 to HW filter on device batadv0 20:57:14 executing program 5: setxattr$security_evm(0x0, &(0x7f0000000140)='security.evm\x00', 0x0, 0x0, 0x3) r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) socket(0x1e, 0x4, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) readv(r1, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000440)=0x8) read$rfkill(0xffffffffffffffff, &(0x7f0000000080), 0x8) [ 130.612360][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.620573][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.669658][ T7651] device hsr_slave_0 entered promiscuous mode [ 130.735956][ T7651] device hsr_slave_1 entered promiscuous mode [ 130.786069][ T7651] debugfs: Directory 'hsr0' with parent '/' already present! [ 130.811632][ T7653] team0: Port device team_slave_0 added [ 130.824677][ T7653] team0: Port device team_slave_1 added [ 130.906661][ T7698] IPVS: ftp: loaded support on port[0] = 21 [ 131.017823][ T7653] device hsr_slave_0 entered promiscuous mode [ 131.055929][ T7653] device hsr_slave_1 entered promiscuous mode [ 131.085749][ T7653] debugfs: Directory 'hsr0' with parent '/' already present! [ 131.138591][ T7683] chnl_net:caif_netlink_parms(): no params data found [ 131.541756][ T7651] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.658304][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.666597][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.730814][ T7690] chnl_net:caif_netlink_parms(): no params data found [ 131.753343][ T7651] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.843322][ T7683] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.855725][ T7683] bridge0: port 1(bridge_slave_0) entered disabled state 20:57:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x2}) preadv(r0, &(0x7f0000003280)=[{&(0x7f0000003300)=""/4097, 0x4}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') [ 131.908228][ T7683] device bridge_slave_0 entered promiscuous mode [ 131.978432][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.005286][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.072420][ T3513] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.079538][ T3513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.131056][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.178431][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.227531][ T3513] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.234616][ T3513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.303058][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.352953][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.404835][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.449110][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.522124][ T7683] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.534871][ T7683] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.573080][ T7683] device bridge_slave_1 entered promiscuous mode [ 132.648509][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.669213][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.970688][ T7690] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.983332][ T7690] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.010042][ T7690] device bridge_slave_0 entered promiscuous mode [ 133.039657][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.055486][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.092168][ T7653] 8021q: adding VLAN 0 to HW filter on device bond0 [ 133.120488][ T7683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.142015][ T7698] chnl_net:caif_netlink_parms(): no params data found [ 133.163109][ T7690] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.187958][ T7690] bridge0: port 2(bridge_slave_1) entered disabled state 20:57:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x2}) preadv(r0, &(0x7f0000003280)=[{&(0x7f0000003300)=""/4097, 0x4}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') [ 133.216543][ T7690] device bridge_slave_1 entered promiscuous mode [ 133.250613][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.277173][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.328493][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.350631][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.379930][ T7653] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.388797][ T7683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 133.415970][ T7690] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.444876][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.455415][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.500268][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.515892][ T7690] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 133.527814][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.540823][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.559065][ T3513] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.566163][ T3513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.574775][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.583635][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.592524][ T3513] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.599591][ T3513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.607674][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.616559][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.625235][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.633724][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.642198][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.650815][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.659561][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.668628][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.681837][ T7683] team0: Port device team_slave_0 added [ 133.715781][ T7698] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.722854][ T7698] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.733777][ T7698] device bridge_slave_0 entered promiscuous mode [ 133.740946][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.749021][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.765998][ T2415] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.773424][ T2415] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.783057][ T7683] team0: Port device team_slave_1 added [ 133.794781][ T7698] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.801917][ T7698] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.809665][ T7698] device bridge_slave_1 entered promiscuous mode 20:57:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x2}) preadv(r0, &(0x7f0000003280)=[{&(0x7f0000003300)=""/4097, 0x4}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') [ 133.830374][ T7651] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.838807][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.848110][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.889262][ T7690] team0: Port device team_slave_0 added [ 133.896648][ T7698] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.907876][ T7653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.947842][ T7683] device hsr_slave_0 entered promiscuous mode [ 133.986045][ T7683] device hsr_slave_1 entered promiscuous mode [ 134.025791][ T7683] debugfs: Directory 'hsr0' with parent '/' already present! [ 134.036352][ T7690] team0: Port device team_slave_1 added [ 134.043119][ T7698] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 134.063972][ T7698] team0: Port device team_slave_0 added [ 134.136051][ T7698] team0: Port device team_slave_1 added [ 134.143962][ T7653] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.154740][ T2415] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 134.165314][ T2415] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:57:17 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 134.227960][ T7690] device hsr_slave_0 entered promiscuous mode [ 134.253200][ T7690] device hsr_slave_1 entered promiscuous mode [ 134.335725][ T7690] debugfs: Directory 'hsr0' with parent '/' already present! [ 134.358047][ C0] hrtimer: interrupt took 25091 ns [ 134.382007][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 134.459247][ T7698] device hsr_slave_0 entered promiscuous mode [ 134.511782][ T7698] device hsr_slave_1 entered promiscuous mode [ 134.576295][ T7698] debugfs: Directory 'hsr0' with parent '/' already present! [ 135.012572][ T7824] syz-executor.1 (7824) used greatest stack depth: 10024 bytes left [ 135.067995][ T7683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.140302][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 135.140317][ T25] audit: type=1800 audit(1575406638.588:31): pid=7852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16522 res=0 [ 135.247599][ T7690] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.310187][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.325403][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 135.340707][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:57:18 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = memfd_create(&(0x7f0000000140)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r3 = dup(r2) execveat(r3, 0x0, &(0x7f0000000140), 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x7, 0x8}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={r4, 0x0, 0x32}, 0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fsetxattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000300)='/dev/radio#\x00', 0xc, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) [ 135.393384][ T7683] 8021q: adding VLAN 0 to HW filter on device team0 [ 135.423503][ T7690] 8021q: adding VLAN 0 to HW filter on device team0 [ 135.499169][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.549277][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.628928][ T7698] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.675901][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.684662][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 20:57:19 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 135.789671][ T3513] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.796795][ T3513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.948948][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.009179][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 136.009203][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 20:57:19 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = memfd_create(&(0x7f0000000140)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r3 = dup(r2) execveat(r3, 0x0, &(0x7f0000000140), 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x7, 0x8}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={r4, 0x0, 0x32}, 0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fsetxattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000300)='/dev/radio#\x00', 0xc, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) [ 136.186086][ T3513] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.193155][ T3513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.287430][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 136.317787][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 136.397461][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 136.516146][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 136.582457][ T7683] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 136.678686][ T7683] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 136.773782][ T7690] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 20:57:20 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 136.885770][ T7690] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 20:57:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_genetlink_get_family_id$ipvs(0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) r2 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r3, &(0x7f0000001400)=[{&(0x7f00000010c0)=""/247, 0xf7}], 0x1) ppoll(&(0x7f0000001080)=[{r4}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r3, 0xa, 0x12) dup2(r3, r4) fcntl$setown(r3, 0x8, r2) tkill(r2, 0x15) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) mlockall(0x0) inotify_init1(0x0) alarm(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) [ 136.973492][ T7698] 8021q: adding VLAN 0 to HW filter on device team0 [ 136.996481][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.004559][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.107039][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.156180][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.164567][ T7685] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.171622][ T7685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.261000][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 137.383009][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.457456][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.535825][ T7685] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.542904][ T7685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.667498][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.760560][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 137.796829][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 137.876237][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.884732][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.997057][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.049238][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.116439][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.176535][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.228800][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.276562][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.336211][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.349836][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.396297][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.468808][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.496511][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.548768][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.589418][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.604298][ T7859] ================================================================== [ 138.621649][ T7859] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 138.629192][ T7859] [ 138.631547][ T7859] read to 0xffff888128ad8d68 of 2 bytes by task 7871 on cpu 1: [ 138.639300][ T7859] pid_update_inode+0x25/0x70 [ 138.643979][ T7859] pid_revalidate+0x91/0xd0 [ 138.644829][ T7683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 138.648481][ T7859] lookup_fast+0x6f2/0x700 [ 138.648494][ T7859] walk_component+0x6d/0xe70 [ 138.648513][ T7859] link_path_walk.part.0+0x5d3/0xa90 [ 138.648529][ T7859] path_openat+0x14f/0x36e0 [ 138.648543][ T7859] do_filp_open+0x11e/0x1b0 [ 138.648575][ T7859] do_sys_open+0x3b3/0x4f0 [ 138.682961][ T7859] __x64_sys_open+0x55/0x70 [ 138.687463][ T7859] do_syscall_64+0xcc/0x370 [ 138.691955][ T7859] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.697824][ T7859] [ 138.700142][ T7859] write to 0xffff888128ad8d68 of 2 bytes by task 7859 on cpu 0: [ 138.707776][ T7859] pid_update_inode+0x51/0x70 [ 138.712446][ T7859] pid_revalidate+0x91/0xd0 [ 138.716981][ T7859] lookup_fast+0x6f2/0x700 [ 138.721404][ T7859] walk_component+0x6d/0xe70 [ 138.725992][ T7859] link_path_walk.part.0+0x5d3/0xa90 [ 138.731280][ T7859] path_openat+0x14f/0x36e0 [ 138.735774][ T7859] do_filp_open+0x11e/0x1b0 [ 138.740269][ T7859] do_sys_open+0x3b3/0x4f0 [ 138.744677][ T7859] __x64_sys_open+0x55/0x70 [ 138.749171][ T7859] do_syscall_64+0xcc/0x370 [ 138.753668][ T7859] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.759651][ T7859] [ 138.761963][ T7859] Reported by Kernel Concurrency Sanitizer on: [ 138.768107][ T7859] CPU: 0 PID: 7859 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 138.775282][ T7859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.785326][ T7859] ================================================================== [ 138.793373][ T7859] Kernel panic - not syncing: panic_on_warn set ... [ 138.799955][ T7859] CPU: 0 PID: 7859 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 138.807131][ T7859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.817273][ T7859] Call Trace: [ 138.820561][ T7859] dump_stack+0x11d/0x181 [ 138.824902][ T7859] panic+0x210/0x640 [ 138.828802][ T7859] ? vprintk_func+0x8d/0x140 [ 138.833391][ T7859] kcsan_report.cold+0xc/0xd [ 138.837982][ T7859] kcsan_setup_watchpoint+0x3fe/0x460 [ 138.843388][ T7859] __tsan_unaligned_write2+0xc4/0x100 [ 138.848756][ T7859] pid_update_inode+0x51/0x70 [ 138.853426][ T7859] pid_revalidate+0x91/0xd0 [ 138.857931][ T7859] lookup_fast+0x6f2/0x700 [ 138.862446][ T7859] walk_component+0x6d/0xe70 [ 138.867030][ T7859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.873260][ T7859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.879489][ T7859] ? security_inode_permission+0xa5/0xc0 [ 138.885116][ T7859] ? inode_permission+0xa0/0x3c0 [ 138.890051][ T7859] link_path_walk.part.0+0x5d3/0xa90 [ 138.895340][ T7859] path_openat+0x14f/0x36e0 [ 138.899840][ T7859] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 138.905728][ T7859] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 138.911968][ T7859] ? __rcu_read_unlock+0x66/0x3c0 [ 138.916996][ T7859] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 138.922892][ T7859] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 138.928784][ T7859] ? __read_once_size+0x41/0xe0 [ 138.933638][ T7859] do_filp_open+0x11e/0x1b0 [ 138.938135][ T7859] ? __alloc_fd+0x2ef/0x3b0 [ 138.942645][ T7859] do_sys_open+0x3b3/0x4f0 [ 138.947234][ T7859] __x64_sys_open+0x55/0x70 [ 138.951731][ T7859] do_syscall_64+0xcc/0x370 [ 138.956228][ T7859] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.962116][ T7859] RIP: 0033:0x7f5cf0388120 [ 138.966525][ T7859] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 138.986214][ T7859] RSP: 002b:00007ffe819ee708 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 138.994616][ T7859] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f5cf0388120 [ 139.002574][ T7859] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f5cf0856d00 [ 139.010534][ T7859] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f5cf0650a10 [ 139.018492][ T7859] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5cf0855d00 [ 139.026461][ T7859] R13: 00000000016b71c0 R14: 0000000000000005 R15: 0000000000000000 [ 139.035767][ T7859] Kernel Offset: disabled [ 139.040143][ T7859] Rebooting in 86400 seconds..