[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.142222][ T26] audit: type=1800 audit(1570697450.643:25): pid=7055 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.171511][ T26] audit: type=1800 audit(1570697450.643:26): pid=7055 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 35.198096][ T26] audit: type=1800 audit(1570697450.643:27): pid=7055 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.227' (ECDSA) to the list of known hosts. 2019/10/10 08:51:00 fuzzer started 2019/10/10 08:51:02 dialing manager at 10.128.0.105:34287 2019/10/10 08:51:02 syscalls: 2523 2019/10/10 08:51:02 code coverage: enabled 2019/10/10 08:51:02 comparison tracing: enabled 2019/10/10 08:51:02 extra coverage: extra coverage is not supported by the kernel 2019/10/10 08:51:02 setuid sandbox: enabled 2019/10/10 08:51:02 namespace sandbox: enabled 2019/10/10 08:51:02 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/10 08:51:02 fault injection: enabled 2019/10/10 08:51:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/10 08:51:02 net packet injection: enabled 2019/10/10 08:51:02 net device setup: enabled 2019/10/10 08:51:02 concurrency sanitizer: enabled 08:51:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x15f}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x40000) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) syzkaller login: [ 48.901796][ T7221] IPVS: ftp: loaded support on port[0] = 21 08:51:04 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = gettid() tkill(r0, 0x40) r1 = pidfd_open(r0, 0x0) ppoll(&(0x7f0000000380)=[{r1}], 0x1, &(0x7f0000000400), 0x0, 0x0) [ 48.997963][ T7221] chnl_net:caif_netlink_parms(): no params data found [ 49.036771][ T7221] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.043922][ T7221] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.056491][ T7221] device bridge_slave_0 entered promiscuous mode [ 49.064452][ T7221] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.084730][ T7221] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.092784][ T7221] device bridge_slave_1 entered promiscuous mode [ 49.136398][ T7221] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 49.166168][ T7221] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.209105][ T7221] team0: Port device team_slave_0 added [ 49.226008][ T7221] team0: Port device team_slave_1 added 08:51:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newsa={0x13c, 0x10, 0x963ddcda599079f3, 0x0, 0x0, {{@in, @in=@loopback}, {@in6=@mcast2, 0x0, 0x33}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}}, 0x0) [ 49.347841][ T7221] device hsr_slave_0 entered promiscuous mode [ 49.405685][ T7221] device hsr_slave_1 entered promiscuous mode [ 49.472407][ T7221] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.479578][ T7221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.486970][ T7221] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.494076][ T7221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.551503][ T7224] IPVS: ftp: loaded support on port[0] = 21 [ 49.663755][ T7221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.679556][ T7227] IPVS: ftp: loaded support on port[0] = 21 [ 49.704262][ T7221] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.716397][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.735732][ T12] bridge0: port 1(bridge_slave_0) entered disabled state 08:51:05 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x80001, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x0, @local, 'veth1\x00'}}, 0x1e) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1f7}, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) [ 49.754364][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.768270][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 49.857422][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.867414][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.874459][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.906150][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.925540][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.932599][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.976935][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.981373][ T7231] IPVS: ftp: loaded support on port[0] = 21 [ 50.016080][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.025997][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 50.035337][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.046669][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 50.055515][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.063819][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 50.073902][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.084848][ T7221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:51:05 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, 0x0, r1) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='stat\x00') exit_group(0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) preadv(r2, &(0x7f0000001300)=[{&(0x7f0000000000)=""/68, 0x44}], 0x1, 0x0) [ 50.118028][ T7224] chnl_net:caif_netlink_parms(): no params data found [ 50.151560][ T7221] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 50.283260][ T7224] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.296011][ T7224] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.315718][ T7224] device bridge_slave_0 entered promiscuous mode [ 50.344468][ T7227] chnl_net:caif_netlink_parms(): no params data found [ 50.365103][ T7224] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.372158][ T7224] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.397736][ T7224] device bridge_slave_1 entered promiscuous mode [ 50.495803][ T7241] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 50.548447][ T7231] chnl_net:caif_netlink_parms(): no params data found [ 50.569116][ T7224] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.606915][ T7224] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:51:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x15f}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x40000) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) [ 50.681117][ T7231] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.696882][ T7231] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.705029][ T7231] device bridge_slave_0 entered promiscuous mode [ 50.733961][ T7231] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.755005][ T7231] bridge0: port 2(bridge_slave_1) entered disabled state 08:51:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x15f}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x40000) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) [ 50.786380][ T7231] device bridge_slave_1 entered promiscuous mode [ 50.799099][ T7242] IPVS: ftp: loaded support on port[0] = 21 [ 50.820941][ T7227] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.840802][ T7227] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.858206][ T7227] device bridge_slave_0 entered promiscuous mode [ 50.874991][ T7224] team0: Port device team_slave_0 added [ 50.894038][ T7227] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.903467][ T7227] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.918493][ T7227] device bridge_slave_1 entered promiscuous mode 08:51:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x15f}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x40000) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) [ 50.957320][ T7224] team0: Port device team_slave_1 added [ 50.978419][ T7227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.022884][ T7231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.060382][ T7227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:51:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x15f}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x40000) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) [ 51.079502][ T7231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:51:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x15f}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x40000) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) [ 51.207735][ T7224] device hsr_slave_0 entered promiscuous mode [ 51.237855][ T7224] device hsr_slave_1 entered promiscuous mode [ 51.284674][ T7224] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.304495][ T7227] team0: Port device team_slave_0 added 08:51:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x15f}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x40000) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) [ 51.330599][ T7252] IPVS: ftp: loaded support on port[0] = 21 [ 51.350155][ T7227] team0: Port device team_slave_1 added [ 51.357398][ T7231] team0: Port device team_slave_0 added 08:51:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x15f}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x40000) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) [ 51.428331][ T7231] team0: Port device team_slave_1 added [ 51.500874][ T7227] device hsr_slave_0 entered promiscuous mode 08:51:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x15f}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x40000) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) [ 51.565106][ T7227] device hsr_slave_1 entered promiscuous mode [ 51.604750][ T7227] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.767724][ T7231] device hsr_slave_0 entered promiscuous mode [ 51.825045][ T7231] device hsr_slave_1 entered promiscuous mode [ 51.894851][ T7231] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.910174][ T7224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.944411][ T7242] chnl_net:caif_netlink_parms(): no params data found [ 51.980498][ T7224] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.001321][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.009084][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.031558][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.041220][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.050042][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.057077][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.065756][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.074308][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.082862][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.089921][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.098307][ T7252] chnl_net:caif_netlink_parms(): no params data found [ 52.115635][ T7227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.134432][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.143680][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.153263][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.180289][ T7227] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.205294][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.214014][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.223532][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.232316][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.240940][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.248901][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.256811][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.265611][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.274113][ T3022] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.281246][ T3022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.289178][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.297974][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.308247][ T7231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.323530][ T7242] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.330732][ T7242] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.338792][ T7242] device bridge_slave_0 entered promiscuous mode [ 52.359397][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.368436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.378970][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.386031][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.394040][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.403405][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.412260][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.421041][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.430283][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.439263][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.448957][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.457689][ T7242] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.467628][ T7242] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.476062][ T7242] device bridge_slave_1 entered promiscuous mode [ 52.486994][ T7224] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 52.497478][ T7224] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.510804][ T7252] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.518916][ T7252] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.527618][ T7252] device bridge_slave_0 entered promiscuous mode [ 52.537870][ T7252] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.547736][ T7252] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.556374][ T7252] device bridge_slave_1 entered promiscuous mode [ 52.569565][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.578216][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.587395][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.596127][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.604494][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.613241][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.621860][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.629777][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.637927][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.651401][ T7227] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.665317][ T7227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.681514][ T7231] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.698455][ T7224] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.706239][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.720238][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.738213][ T7252] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.749134][ T7242] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.760506][ T7242] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.786756][ T7252] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.807247][ T7242] team0: Port device team_slave_0 added [ 52.821064][ T7227] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.844475][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.853713][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.865838][ T27] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.872860][ T27] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.880991][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.889854][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.898489][ T27] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.905552][ T27] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.913490][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.933727][ T7242] team0: Port device team_slave_1 added [ 52.946317][ T7252] team0: Port device team_slave_0 added [ 52.953485][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.976208][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.999227][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.015837][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.030470][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.039593][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 08:51:08 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = gettid() tkill(r0, 0x40) r1 = pidfd_open(r0, 0x0) ppoll(&(0x7f0000000380)=[{r1}], 0x1, &(0x7f0000000400), 0x0, 0x0) [ 53.048790][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.057875][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.069415][ T7231] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.081806][ T7231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.096229][ T7252] team0: Port device team_slave_1 added [ 53.102903][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.113368][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.122990][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.196434][ T7231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.247906][ T7242] device hsr_slave_0 entered promiscuous mode [ 53.295038][ T7242] device hsr_slave_1 entered promiscuous mode [ 53.319653][ C0] hrtimer: interrupt took 31345 ns 08:51:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newsa={0x13c, 0x10, 0x963ddcda599079f3, 0x0, 0x0, {{@in, @in=@loopback}, {@in6=@mcast2, 0x0, 0x33}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}}, 0x0) [ 53.344713][ T7242] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.397698][ T7252] device hsr_slave_0 entered promiscuous mode [ 53.445003][ T7252] device hsr_slave_1 entered promiscuous mode [ 53.485407][ T7252] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.550273][ T7242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.573178][ T7242] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.581777][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.589854][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.609471][ T7252] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.646444][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.655751][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.669533][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.676629][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.688283][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.697031][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.705858][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.712943][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.722022][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.731403][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.749776][ T7252] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.758467][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.767945][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.776861][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.785965][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.795151][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.804020][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.812814][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.822770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.834055][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.878890][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.892549][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.903976][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.913973][ T7226] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.921121][ T7226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.933578][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.945429][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.955208][ T7226] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.962395][ T7226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.974803][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.989154][ T7312] ================================================================== [ 53.997248][ T7312] BUG: KCSAN: data-race in poll_schedule_timeout.constprop.0 / pollwake [ 54.005546][ T7312] [ 54.007864][ T7312] write to 0xffffc90000f3ba60 of 4 bytes by task 7313 on cpu 0: [ 54.015477][ T7312] pollwake+0xe3/0x140 [ 54.019544][ T7312] __wake_up_common+0x7b/0x180 [ 54.024291][ T7312] __wake_up_common_lock+0x77/0xb0 [ 54.029384][ T7312] __wake_up+0xe/0x10 [ 54.033362][ T7312] wakeup_pipe_writers+0x74/0xb0 [ 54.038284][ T7312] splice_from_pipe_next.part.0+0x17a/0x1d0 [ 54.044162][ T7312] __splice_from_pipe+0xa4/0x480 [ 54.049082][ T7312] do_vmsplice.part.0+0x1c5/0x210 [ 54.054091][ T7312] __do_sys_vmsplice+0x15f/0x1c0 [ 54.059014][ T7312] __x64_sys_vmsplice+0x5e/0x80 [ 54.063849][ T7312] do_syscall_64+0xcf/0x2f0 [ 54.068358][ T7312] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 54.074223][ T7312] [ 54.076544][ T7312] read to 0xffffc90000f3ba60 of 4 bytes by task 7312 on cpu 1: [ 54.084073][ T7312] poll_schedule_timeout.constprop.0+0x50/0xc0 [ 54.090210][ T7312] do_select+0xd7f/0x1020 [ 54.094522][ T7312] core_sys_select+0x38b/0x520 [ 54.099272][ T7312] __x64_sys_pselect6+0x22a/0x280 [ 54.104279][ T7312] do_syscall_64+0xcf/0x2f0 [ 54.108767][ T7312] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 54.114634][ T7312] [ 54.116944][ T7312] Reported by Kernel Concurrency Sanitizer on: [ 54.123083][ T7312] CPU: 1 PID: 7312 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 54.130515][ T7312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.140550][ T7312] ================================================================== [ 54.148593][ T7312] Kernel panic - not syncing: panic_on_warn set ... [ 54.155166][ T7312] CPU: 1 PID: 7312 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 54.162597][ T7312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.172630][ T7312] Call Trace: [ 54.175906][ T7312] dump_stack+0xf5/0x159 [ 54.180136][ T7312] panic+0x209/0x639 [ 54.184017][ T7312] ? vprintk_func+0x8d/0x140 [ 54.188596][ T7312] kcsan_report.cold+0xc/0x1b [ 54.193260][ T7312] __kcsan_setup_watchpoint+0x3ee/0x510 [ 54.198793][ T7312] __tsan_read4+0x2c/0x30 [ 54.203113][ T7312] poll_schedule_timeout.constprop.0+0x50/0xc0 [ 54.209252][ T7312] do_select+0xd7f/0x1020 [ 54.213581][ T7312] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 54.219462][ T7312] ? set_fd_set.part.0+0x60/0x60 [ 54.224388][ T7312] ? set_fd_set.part.0+0x60/0x60 [ 54.229316][ T7312] ? set_fd_set.part.0+0x60/0x60 [ 54.234239][ T7312] ? set_fd_set.part.0+0x60/0x60 [ 54.239164][ T7312] ? set_fd_set.part.0+0x60/0x60 [ 54.244092][ T7312] ? set_fd_set.part.0+0x60/0x60 [ 54.249019][ T7312] ? set_fd_set.part.0+0x60/0x60 [ 54.254043][ T7312] ? __tsan_read8+0x2c/0x30 [ 54.258533][ T7312] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.264148][ T7312] ? check_stack_object+0xda/0x110 [ 54.269246][ T7312] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.274863][ T7312] ? __tsan_read8+0x2c/0x30 [ 54.279355][ T7312] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 54.285598][ T7312] core_sys_select+0x38b/0x520 [ 54.290352][ T7312] ? __tsan_read8+0x2c/0x30 [ 54.294845][ T7312] ? _raw_spin_unlock+0x4b/0x60 [ 54.299680][ T7312] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.305295][ T7312] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.310909][ T7312] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.316525][ T7312] ? __kcsan_setup_watchpoint+0x96/0x510 [ 54.322136][ T7312] ? __tsan_read8+0x2c/0x30 [ 54.326624][ T7312] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 54.332332][ T7312] __x64_sys_pselect6+0x22a/0x280 [ 54.337338][ T7312] ? __tsan_read8+0x2c/0x30 [ 54.341831][ T7312] do_syscall_64+0xcf/0x2f0 [ 54.346324][ T7312] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 54.352198][ T7312] RIP: 0033:0x459a59 [ 54.356081][ T7312] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 54.375669][ T7312] RSP: 002b:00007fa3ffd11c78 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 54.384061][ T7312] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a59 [ 54.392015][ T7312] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000040 [ 54.400319][ T7312] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 54.408276][ T7312] R10: 0000000020000140 R11: 0000000000000246 R12: 00007fa3ffd126d4 [ 54.416247][ T7312] R13: 00000000004c6fdb R14: 00000000004dc720 R15: 00000000ffffffff [ 54.425396][ T7312] Kernel Offset: disabled [ 54.429710][ T7312] Rebooting in 86400 seconds..