[ 55.856467][ T26] audit: type=1800 audit(1573548661.747:27): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 55.880710][ T26] audit: type=1800 audit(1573548661.747:28): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 56.701182][ T26] audit: type=1800 audit(1573548662.657:29): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 56.721417][ T26] audit: type=1800 audit(1573548662.657:30): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.214' (ECDSA) to the list of known hosts. 2019/11/12 08:51:12 fuzzer started 2019/11/12 08:51:14 dialing manager at 10.128.0.105:45453 2019/11/12 08:51:15 syscalls: 2566 2019/11/12 08:51:15 code coverage: enabled 2019/11/12 08:51:15 comparison tracing: enabled 2019/11/12 08:51:15 extra coverage: extra coverage is not supported by the kernel 2019/11/12 08:51:15 setuid sandbox: enabled 2019/11/12 08:51:15 namespace sandbox: enabled 2019/11/12 08:51:15 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/12 08:51:15 fault injection: enabled 2019/11/12 08:51:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/12 08:51:15 net packet injection: enabled 2019/11/12 08:51:15 net device setup: enabled 2019/11/12 08:51:15 concurrency sanitizer: enabled 2019/11/12 08:51:15 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/12 08:51:18 adding functions to KCSAN blacklist: 'find_next_bit' 'tcp_add_backlog' 'taskstats_exit' 'xas_clear_mark' 'blk_mq_sched_dispatch_requests' '__hrtimer_run_queues' 'blk_mq_dispatch_rq_list' 'tomoyo_supervisor' 'pipe_poll' '__ext4_new_inode' 'tick_sched_do_timer' 'vfs_fsync_range' 'find_get_pages_range_tag' 'kauditd_thread' 'generic_write_end' 'generic_file_read_iter' 'ep_poll' 'vm_area_dup' 'blk_mq_free_request' 'mod_timer' 08:51:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x2) getuid() getegid() write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) pipe(0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) syzkaller login: [ 91.651535][ T7719] IPVS: ftp: loaded support on port[0] = 21 08:51:37 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x11, 0x0, 0x0) [ 91.749607][ T7719] chnl_net:caif_netlink_parms(): no params data found [ 91.802499][ T7719] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.809741][ T7719] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.817748][ T7719] device bridge_slave_0 entered promiscuous mode [ 91.826048][ T7719] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.834152][ T7719] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.842118][ T7719] device bridge_slave_1 entered promiscuous mode [ 91.861338][ T7719] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 91.872550][ T7719] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.904196][ T7719] team0: Port device team_slave_0 added [ 91.915408][ T7719] team0: Port device team_slave_1 added [ 91.915527][ T7722] IPVS: ftp: loaded support on port[0] = 21 08:51:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) sendmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x40090) [ 92.020601][ T7719] device hsr_slave_0 entered promiscuous mode [ 92.065609][ T7719] device hsr_slave_1 entered promiscuous mode [ 92.163318][ T7719] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.170900][ T7719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.178348][ T7719] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.185508][ T7719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.294277][ T7727] IPVS: ftp: loaded support on port[0] = 21 [ 92.417565][ T7722] chnl_net:caif_netlink_parms(): no params data found [ 92.438833][ T7719] 8021q: adding VLAN 0 to HW filter on device bond0 08:51:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) [ 92.487959][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.506685][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.535226][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.576366][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 92.632614][ T7719] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.672191][ T7722] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.695326][ T7722] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.726103][ T7722] device bridge_slave_0 entered promiscuous mode [ 92.848621][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.875310][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.882381][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.925416][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.955876][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.962964][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.006374][ T7722] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.013496][ T7722] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.056300][ T7722] device bridge_slave_1 entered promiscuous mode [ 93.082592][ T7719] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 93.135649][ T7719] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 93.179741][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 93.189066][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 93.216620][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 93.256586][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 93.296745][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.325413][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.334016][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.356461][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 08:51:39 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f00000000c0)=0x2000000000000074, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r1 = memfd_create(&(0x7f0000000040)='G\'\x00\x9c\x1cH\xf9\x9e\x00\x16~\xdb`\x89\x86\x9a\xd4\xceof-\xbc\x12\x94\xe7\xcbH\x8dU;Z\xfc\xe1id?\xd4\x8a\x00Y@\xfe\xfe\b\x8d\xd0\x84\xcd\xf5\xd5\x83\xec\x96;\x16\x17\xf2\xba\xe1=\xe6.\xa5|\x02q', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpid() pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 93.408625][ T7722] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 93.436196][ T7727] chnl_net:caif_netlink_parms(): no params data found [ 93.470790][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 93.485740][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 93.520562][ T7719] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.521975][ T7753] IPVS: ftp: loaded support on port[0] = 21 [ 93.535223][ T7722] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 93.553327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.576798][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 93.696976][ T7722] team0: Port device team_slave_0 added [ 93.726790][ T7727] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.733864][ T7727] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.773246][ T7727] device bridge_slave_0 entered promiscuous mode [ 93.804372][ T7722] team0: Port device team_slave_1 added [ 93.841614][ T7727] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.858514][ T7727] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.880826][ T7727] device bridge_slave_1 entered promiscuous mode [ 93.967214][ T7722] device hsr_slave_0 entered promiscuous mode 08:51:40 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x2) shutdown(r0, 0x0) [ 94.025072][ T7722] device hsr_slave_1 entered promiscuous mode [ 94.038483][ T7771] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 94.062396][ C0] hrtimer: interrupt took 38520 ns [ 94.105162][ T7722] debugfs: Directory 'hsr0' with parent '/' already present! [ 94.129462][ T7727] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.156124][ T7727] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:51:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x2) getuid() getegid() write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) pipe(0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 94.201613][ T7762] IPVS: ftp: loaded support on port[0] = 21 [ 94.226327][ T7753] chnl_net:caif_netlink_parms(): no params data found [ 94.239157][ T7727] team0: Port device team_slave_0 added [ 94.260656][ T7727] team0: Port device team_slave_1 added [ 94.411678][ T7727] device hsr_slave_0 entered promiscuous mode [ 94.465043][ T7727] device hsr_slave_1 entered promiscuous mode [ 94.504893][ T7727] debugfs: Directory 'hsr0' with parent '/' already present! [ 94.533061][ T7788] IPVS: ftp: loaded support on port[0] = 21 [ 94.545519][ T7753] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.552684][ T7753] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.580476][ T7753] device bridge_slave_0 entered promiscuous mode [ 94.624952][ T7722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.650121][ T7753] bridge0: port 2(bridge_slave_1) entered blocking state 08:51:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x2) getuid() getegid() write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) pipe(0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 94.675435][ T7753] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.683668][ T7753] device bridge_slave_1 entered promiscuous mode [ 94.815877][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.849829][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.883550][ T7722] 8021q: adding VLAN 0 to HW filter on device team0 [ 94.954276][ T7753] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 95.007965][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.035180][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 08:51:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x2) getuid() getegid() write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) pipe(0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 95.082803][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.090049][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.215600][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.224603][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.305318][ T3012] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.312664][ T3012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.448923][ T7753] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 95.497631][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.508255][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.572152][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.620471][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 08:51:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x2) getuid() getegid() write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) pipe(0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 95.668992][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.755808][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.792569][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.860292][ T7722] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 95.920451][ T7722] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 96.022725][ T7762] chnl_net:caif_netlink_parms(): no params data found [ 96.034124][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.065656][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.095177][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 08:51:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x2) getuid() getegid() write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) pipe(0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 96.155454][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.217087][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.339722][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.374216][ T7753] team0: Port device team_slave_0 added [ 96.387826][ T7722] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.422510][ T7727] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.467919][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.482132][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.536391][ T7753] team0: Port device team_slave_1 added [ 96.559672][ T7727] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.602539][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.619250][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 08:51:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x2) getuid() getegid() write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) pipe(0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 96.670728][ T7788] chnl_net:caif_netlink_parms(): no params data found [ 96.725257][ T7762] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.732356][ T7762] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.805671][ T7762] device bridge_slave_0 entered promiscuous mode [ 96.868271][ T7762] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.894791][ T7762] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.902693][ T7762] device bridge_slave_1 entered promiscuous mode [ 96.997478][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.048138][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.061932][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.069076][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state 08:51:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x2) getuid() getegid() write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) pipe(0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 97.147020][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.185607][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.235080][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.243012][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.265297][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 97.274460][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 97.315725][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 97.324307][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.365731][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 97.374416][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.406168][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.419493][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.492316][ T7753] device hsr_slave_0 entered promiscuous mode [ 97.545567][ T7753] device hsr_slave_1 entered promiscuous mode [ 97.605225][ T7753] debugfs: Directory 'hsr0' with parent '/' already present! [ 97.636500][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.645985][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 97.660445][ T7727] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 97.680393][ T7788] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.692536][ T7788] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.700517][ T7788] device bridge_slave_0 entered promiscuous mode [ 97.714883][ T7726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.723410][ T7726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.762384][ T7762] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 97.791008][ T7762] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:51:43 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x11, 0x0, 0x0) [ 97.822081][ T7788] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.834822][ T7788] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.865627][ T7788] device bridge_slave_1 entered promiscuous mode [ 97.904497][ T7727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.929484][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 97.950399][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 98.050557][ T7762] team0: Port device team_slave_0 added [ 98.085197][ T7762] team0: Port device team_slave_1 added [ 98.104447][ T7788] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.124939][ T7875] ================================================================== [ 98.133826][ T7875] BUG: KCSAN: data-race in pid_update_inode / vfs_read [ 98.141906][ T7875] [ 98.144336][ T7875] read to 0xffff888125625ac8 of 2 bytes by task 7893 on cpu 0: [ 98.157013][ T7875] vfs_read+0x1ad/0x2c0 [ 98.161169][ T7875] ksys_read+0xd5/0x1b0 [ 98.165322][ T7875] __x64_sys_read+0x4c/0x60 [ 98.172609][ T7875] do_syscall_64+0xcc/0x370 [ 98.177131][ T7875] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 98.183371][ T7875] [ 98.185710][ T7875] write to 0xffff888125625ac8 of 2 bytes by task 7875 on cpu 1: [ 98.188966][ T7788] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.193360][ T7875] pid_update_inode+0x51/0x70 [ 98.207054][ T7875] pid_revalidate+0x91/0xd0 [ 98.211557][ T7875] lookup_fast+0x618/0x700 [ 98.215987][ T7875] path_openat+0x2ac/0x36e0 [ 98.220486][ T7875] do_filp_open+0x11e/0x1b0 [ 98.226129][ T7875] do_sys_open+0x3b3/0x4f0 [ 98.230575][ T7875] __x64_sys_open+0x55/0x70 [ 98.230581][ T7753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.241686][ T7875] do_syscall_64+0xcc/0x370 [ 98.246195][ T7875] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 98.252089][ T7875] [ 98.254412][ T7875] Reported by Kernel Concurrency Sanitizer on: [ 98.260571][ T7875] CPU: 1 PID: 7875 Comm: ps Not tainted 5.4.0-rc7+ #0 [ 98.264783][ T7753] 8021q: adding VLAN 0 to HW filter on device team0 [ 98.267319][ T7875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.267333][ T7875] ================================================================== [ 98.292483][ T7875] Kernel panic - not syncing: panic_on_warn set ... [ 98.299075][ T7875] CPU: 1 PID: 7875 Comm: ps Not tainted 5.4.0-rc7+ #0 [ 98.305832][ T7875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.316922][ T7875] Call Trace: [ 98.320585][ T7875] dump_stack+0x11d/0x181 [ 98.325007][ T7875] panic+0x210/0x640 [ 98.328912][ T7875] ? vprintk_func+0x8d/0x140 [ 98.333506][ T7875] kcsan_report.cold+0xc/0x1a [ 98.338202][ T7875] kcsan_setup_watchpoint+0x3fe/0x460 [ 98.347425][ T7875] __tsan_unaligned_write2+0xc4/0x100 [ 98.352998][ T7875] pid_update_inode+0x51/0x70 [ 98.357692][ T7875] pid_revalidate+0x91/0xd0 [ 98.362212][ T7875] lookup_fast+0x618/0x700 [ 98.368638][ T7875] path_openat+0x2ac/0x36e0 [ 98.373261][ T7875] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 98.384138][ T7875] ? preempt_schedule+0x30/0x40 [ 98.389000][ T7875] do_filp_open+0x11e/0x1b0 [ 98.395078][ T7875] ? __alloc_fd+0x2ef/0x3b0 [ 98.400729][ T7875] do_sys_open+0x3b3/0x4f0 [ 98.406815][ T7875] __x64_sys_open+0x55/0x70 [ 98.411329][ T7875] do_syscall_64+0xcc/0x370 [ 98.416017][ T7875] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 98.425022][ T7875] RIP: 0033:0x7fb3976d3120 [ 98.429497][ T7875] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 98.449889][ T7875] RSP: 002b:00007ffd20403bd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 98.458425][ T7875] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fb3976d3120 [ 98.466537][ T7875] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fb397ba1d00 [ 98.475485][ T7875] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007fb39799b57b [ 98.485114][ T7875] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb397ba0d00 [ 98.495275][ T7875] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 98.504770][ T7875] Kernel Offset: disabled [ 98.509662][ T7875] Rebooting in 86400 seconds..