[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.389852][ T26] audit: type=1800 audit(1566834140.851:25): pid=8512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 54.430282][ T26] audit: type=1800 audit(1566834140.861:26): pid=8512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 54.470012][ T26] audit: type=1800 audit(1566834140.861:27): pid=8512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.120' (ECDSA) to the list of known hosts. 2019/08/26 15:42:29 fuzzer started 2019/08/26 15:42:32 dialing manager at 10.128.0.26:45029 2019/08/26 15:42:32 syscalls: 2487 2019/08/26 15:42:32 code coverage: enabled 2019/08/26 15:42:32 comparison tracing: enabled 2019/08/26 15:42:32 extra coverage: extra coverage is not supported by the kernel 2019/08/26 15:42:32 setuid sandbox: enabled 2019/08/26 15:42:32 namespace sandbox: enabled 2019/08/26 15:42:32 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/26 15:42:32 fault injection: enabled 2019/08/26 15:42:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/26 15:42:32 net packet injection: enabled 2019/08/26 15:42:32 net device setup: enabled 15:44:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) write$nbd(r1, &(0x7f0000000240)={0x67446698, 0x0, 0x2f00, 0x0, 0x0, "c890deccf003eb7c9dba3bec"}, 0x1c) 15:44:30 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000006c0)={{0x80}, 'port1\x00', 0xffffffffffdffffd, 0x2}) syzkaller login: [ 183.929924][ T8677] IPVS: ftp: loaded support on port[0] = 21 [ 184.080445][ T8677] chnl_net:caif_netlink_parms(): no params data found [ 184.123214][ T8680] IPVS: ftp: loaded support on port[0] = 21 [ 184.144679][ T8677] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.152396][ T8677] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.160771][ T8677] device bridge_slave_0 entered promiscuous mode [ 184.183495][ T8677] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.191232][ T8677] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.199133][ T8677] device bridge_slave_1 entered promiscuous mode 15:44:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) connect$inet(r0, &(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10) sendmmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000010c0)=0x19ff, 0x4) socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)="b0", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) [ 184.244169][ T8677] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.285223][ T8677] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.376246][ T8677] team0: Port device team_slave_0 added [ 184.395412][ T8680] chnl_net:caif_netlink_parms(): no params data found [ 184.415374][ T8677] team0: Port device team_slave_1 added [ 184.445040][ T8683] IPVS: ftp: loaded support on port[0] = 21 [ 184.484817][ T8680] bridge0: port 1(bridge_slave_0) entered blocking state 15:44:31 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x38}, 0x1c) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}}, {{0x0, 0x2710}}], 0x30) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaace2, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003805000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 184.492375][ T8680] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.500574][ T8680] device bridge_slave_0 entered promiscuous mode [ 184.510547][ T8680] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.517589][ T8680] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.528217][ T8680] device bridge_slave_1 entered promiscuous mode [ 184.585272][ T8677] device hsr_slave_0 entered promiscuous mode [ 184.640894][ T8677] device hsr_slave_1 entered promiscuous mode 15:44:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x20000, 0x0) tkill(0x0, 0x0) [ 184.787747][ T8680] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.824861][ T8680] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.855102][ T8677] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.862356][ T8677] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.870198][ T8677] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.878842][ T8677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.908008][ T8685] IPVS: ftp: loaded support on port[0] = 21 [ 184.950299][ T8680] team0: Port device team_slave_0 added [ 184.971773][ T8680] team0: Port device team_slave_1 added [ 184.987193][ T8687] IPVS: ftp: loaded support on port[0] = 21 15:44:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) [ 185.113175][ T8680] device hsr_slave_0 entered promiscuous mode [ 185.160624][ T8680] device hsr_slave_1 entered promiscuous mode [ 185.210358][ T8680] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.267549][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.276064][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.291519][ T8677] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.309399][ T8689] IPVS: ftp: loaded support on port[0] = 21 [ 185.318683][ T8683] chnl_net:caif_netlink_parms(): no params data found [ 185.352149][ T8677] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.381563][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.389819][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.398115][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.407081][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.415593][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.422671][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.431367][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.439768][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.448423][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.455499][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.463171][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.508050][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.519019][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.528362][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.536811][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.545297][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.553813][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.562083][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.570127][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.578658][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.587216][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.620174][ T8677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.658330][ T8683] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.665481][ T8683] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.674818][ T8683] device bridge_slave_0 entered promiscuous mode [ 185.687514][ T8685] chnl_net:caif_netlink_parms(): no params data found [ 185.707511][ T8683] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.715720][ T8683] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.723529][ T8683] device bridge_slave_1 entered promiscuous mode [ 185.758135][ T8687] chnl_net:caif_netlink_parms(): no params data found [ 185.775953][ T8683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.817750][ T8683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.852847][ T8687] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.859964][ T8687] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.867884][ T8687] device bridge_slave_0 entered promiscuous mode [ 185.878655][ T8677] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.889550][ T8683] team0: Port device team_slave_0 added [ 185.895615][ T8685] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.903093][ T8685] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.911507][ T8685] device bridge_slave_0 entered promiscuous mode [ 185.918853][ T8687] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.926094][ T8687] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.936546][ T8687] device bridge_slave_1 entered promiscuous mode [ 185.957633][ T8683] team0: Port device team_slave_1 added [ 185.971402][ T8685] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.978465][ T8685] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.990487][ T8685] device bridge_slave_1 entered promiscuous mode [ 186.006188][ T8687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.017849][ T8687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.095854][ T8687] team0: Port device team_slave_0 added [ 186.143497][ T8683] device hsr_slave_0 entered promiscuous mode [ 186.182347][ T8683] device hsr_slave_1 entered promiscuous mode [ 186.230407][ T8683] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.244765][ T8689] chnl_net:caif_netlink_parms(): no params data found [ 186.255762][ T8685] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.272534][ T8685] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.287729][ T8687] team0: Port device team_slave_1 added 15:44:32 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000065c0), 0x32a, 0x0) [ 186.419636][ T8687] device hsr_slave_0 entered promiscuous mode [ 186.460530][ T8687] device hsr_slave_1 entered promiscuous mode [ 186.490297][ T8687] debugfs: Directory 'hsr0' with parent '/' already present! 15:44:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) [ 186.513109][ T8680] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.520926][ T8685] team0: Port device team_slave_0 added [ 186.552745][ T8685] team0: Port device team_slave_1 added [ 186.576678][ T8689] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.583971][ T8689] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.594274][ T8689] device bridge_slave_0 entered promiscuous mode [ 186.612030][ T8689] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.619086][ T8689] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.629102][ T8689] device bridge_slave_1 entered promiscuous mode [ 186.652090][ T8689] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.666261][ T8680] 8021q: adding VLAN 0 to HW filter on device team0 15:44:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$int_out(r0, 0x100810080804526, 0x0) [ 186.702205][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.710082][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.728692][ T8689] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.797035][ T8689] team0: Port device team_slave_0 added [ 186.804400][ T8689] team0: Port device team_slave_1 added [ 186.853507][ T8685] device hsr_slave_0 entered promiscuous mode [ 186.890999][ T8685] device hsr_slave_1 entered promiscuous mode 15:44:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000001440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3dc82f01bfb4a67cf621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', 0x0, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000740)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000840)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)={{}, {}, [{0x2, 0x0, r3}, {}, {0x2, 0x1}], {0x4, 0x1}, [{0x8, 0x4}, {0x8, 0x1}, {0x8, 0x5}, {0x8, 0x4}, {0x8, 0x1}, {0x8, 0x2}, {0x8, 0x2}, {0x8, 0x6}, {0x8, 0x4}, {0x8, 0x1}], {0x10, 0x5}, {0x20, 0x1}}, 0x8c, 0x3) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x80008, &(0x7f0000000880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize'}}], [{@obj_user={'obj_user', 0x3d, '.,(\'*ppp1'}}, {@smackfsroot={'smackfsroot', 0x3d, 'v&\x1e\xa4\xec\x00\x00\x00\x00\x00\xaa\x03\x00'}}, {@obj_user={'obj_user', 0x3d, 'vboxnet0h('}}, {@pcr={'pcr'}}, {@fowner_lt={'fowner<', r3}}, {@smackfsroot={'smackfsroot', 0x3d, 'vmnet0*GPL'}}, {@appraise_type='appraise_type=imasig'}]}}) [ 186.936753][ T8685] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.949772][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.972909][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.986012][ T3772] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.993125][ T3772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.021646][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.029606][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.039087][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.057232][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.064336][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.073071][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.081849][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.100906][ C0] hrtimer: interrupt took 27401 ns [ 187.127754][ T8687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.137433][ T8683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.148088][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.158721][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.167369][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.175898][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.184636][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.192997][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.201618][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.209838][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.218807][ T8680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.238713][ T8687] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.255828][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.267829][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.277637][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:44:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000001440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3dc82f01bfb4a67cf621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', 0x0, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000740)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000840)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)={{}, {}, [{0x2, 0x0, r3}, {}, {0x2, 0x1}], {0x4, 0x1}, [{0x8, 0x4}, {0x8, 0x1}, {0x8, 0x5}, {0x8, 0x4}, {0x8, 0x1}, {0x8, 0x2}, {0x8, 0x2}, {0x8, 0x6}, {0x8, 0x4}, {0x8, 0x1}], {0x10, 0x5}, {0x20, 0x1}}, 0x8c, 0x3) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x80008, &(0x7f0000000880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize'}}], [{@obj_user={'obj_user', 0x3d, '.,(\'*ppp1'}}, {@smackfsroot={'smackfsroot', 0x3d, 'v&\x1e\xa4\xec\x00\x00\x00\x00\x00\xaa\x03\x00'}}, {@obj_user={'obj_user', 0x3d, 'vboxnet0h('}}, {@pcr={'pcr'}}, {@fowner_lt={'fowner<', r3}}, {@smackfsroot={'smackfsroot', 0x3d, 'vmnet0*GPL'}}, {@appraise_type='appraise_type=imasig'}]}}) [ 187.342047][ T8689] device hsr_slave_0 entered promiscuous mode [ 187.371294][ T8689] device hsr_slave_1 entered promiscuous mode [ 187.410297][ T8689] debugfs: Directory 'hsr0' with parent '/' already present! [ 187.466229][ T8691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.481888][ T8691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.489593][ T8691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.536246][ T8691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.546412][ T8691] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.553518][ T8691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.562197][ T8691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.571085][ T8691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.571432][ T8691] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.586235][ T8691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.597716][ T8683] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.627979][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.636121][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.645094][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.685849][ T8680] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.698842][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.711261][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.729213][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.745937][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.759886][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.776547][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 15:44:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000001440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3dc82f01bfb4a67cf621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', 0x0, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000740)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000840)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)={{}, {}, [{0x2, 0x0, r3}, {}, {0x2, 0x1}], {0x4, 0x1}, [{0x8, 0x4}, {0x8, 0x1}, {0x8, 0x5}, {0x8, 0x4}, {0x8, 0x1}, {0x8, 0x2}, {0x8, 0x2}, {0x8, 0x6}, {0x8, 0x4}, {0x8, 0x1}], {0x10, 0x5}, {0x20, 0x1}}, 0x8c, 0x3) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x80008, &(0x7f0000000880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize'}}], [{@obj_user={'obj_user', 0x3d, '.,(\'*ppp1'}}, {@smackfsroot={'smackfsroot', 0x3d, 'v&\x1e\xa4\xec\x00\x00\x00\x00\x00\xaa\x03\x00'}}, {@obj_user={'obj_user', 0x3d, 'vboxnet0h('}}, {@pcr={'pcr'}}, {@fowner_lt={'fowner<', r3}}, {@smackfsroot={'smackfsroot', 0x3d, 'vmnet0*GPL'}}, {@appraise_type='appraise_type=imasig'}]}}) [ 187.785757][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.792896][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.800958][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.809549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.818268][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.825376][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.833678][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.848305][ T8687] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 187.860045][ T8687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 187.882167][ T8685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.929886][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.945512][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.965294][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.975510][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.989754][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.999428][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.013763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.023019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.063817][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.072183][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.083661][ T8685] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.100769][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.109262][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.118674][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.128573][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.137125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.145528][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.153946][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.165735][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.206148][ T8689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.221952][ T8683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.234170][ T8687] 8021q: adding VLAN 0 to HW filter on device batadv0 15:44:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000001440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3dc82f01bfb4a67cf621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', 0x0, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000740)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000840)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)={{}, {}, [{0x2, 0x0, r3}, {}, {0x2, 0x1}], {0x4, 0x1}, [{0x8, 0x4}, {0x8, 0x1}, {0x8, 0x5}, {0x8, 0x4}, {0x8, 0x1}, {0x8, 0x2}, {0x8, 0x2}, {0x8, 0x6}, {0x8, 0x4}, {0x8, 0x1}], {0x10, 0x5}, {0x20, 0x1}}, 0x8c, 0x3) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x80008, &(0x7f0000000880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize'}}], [{@obj_user={'obj_user', 0x3d, '.,(\'*ppp1'}}, {@smackfsroot={'smackfsroot', 0x3d, 'v&\x1e\xa4\xec\x00\x00\x00\x00\x00\xaa\x03\x00'}}, {@obj_user={'obj_user', 0x3d, 'vboxnet0h('}}, {@pcr={'pcr'}}, {@fowner_lt={'fowner<', r3}}, {@smackfsroot={'smackfsroot', 0x3d, 'vmnet0*GPL'}}, {@appraise_type='appraise_type=imasig'}]}}) [ 188.250082][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.266298][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.308162][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.354398][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.361548][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state 15:44:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000001440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3dc82f01bfb4a67cf621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', 0x0, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000740)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000840)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)={{}, {}, [{0x2, 0x0, r3}, {}, {0x2, 0x1}], {0x4, 0x1}, [{0x8, 0x4}, {0x8, 0x1}, {0x8, 0x5}, {0x8, 0x4}, {0x8, 0x1}, {0x8, 0x2}, {0x8, 0x2}, {0x8, 0x6}, {0x8, 0x4}, {0x8, 0x1}], {0x10, 0x5}, {0x20, 0x1}}, 0x8c, 0x3) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x80008, &(0x7f0000000880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize'}}], [{@obj_user={'obj_user', 0x3d, '.,(\'*ppp1'}}, {@smackfsroot={'smackfsroot', 0x3d, 'v&\x1e\xa4\xec\x00\x00\x00\x00\x00\xaa\x03\x00'}}, {@obj_user={'obj_user', 0x3d, 'vboxnet0h('}}, {@pcr={'pcr'}}, {@fowner_lt={'fowner<', r3}}, {@smackfsroot={'smackfsroot', 0x3d, 'vmnet0*GPL'}}, {@appraise_type='appraise_type=imasig'}]}}) [ 188.439449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.469372][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.511905][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.542279][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.549389][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.557380][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.566408][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.576002][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.586019][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.595077][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.605346][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.614153][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.622124][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.629936][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.638750][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.651233][ T8689] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.723104][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.731848][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.748104][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.757440][ T8692] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.764550][ T8692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.772614][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.781216][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.790047][ T8692] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.797143][ T8692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.805470][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.816104][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.824102][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.832768][ T8692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.854934][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.863876][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.875215][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.885278][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.894974][ T8685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.959069][ T8685] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.982052][ T8683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.990583][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.999791][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.015424][ T8689] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 189.053315][ T8689] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 189.085788][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.118994][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.141065][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.149401][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.158315][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.200091][ T8689] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.386843][ T8780] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 189.484765][ T8783] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 189.501941][ T8783] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 189.514625][ T8783] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 189.525330][ T8783] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:44:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) connect$inet(r0, &(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10) sendmmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000010c0)=0x19ff, 0x4) socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)="b0", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) [ 189.550360][ T8783] EXT4-fs error (device loop3): ext4_fill_super:4469: inode #2: comm syz-executor.3: iget: root inode unallocated [ 189.564396][ T8783] EXT4-fs (loop3): get root inode failed [ 189.586393][ T8783] EXT4-fs (loop3): mount failed [ 189.612627][ T8783] ------------[ cut here ]------------ [ 189.618133][ T8783] ODEBUG: free active (active state 0) object type: percpu_counter hint: 0x0 [ 189.627206][ T8783] WARNING: CPU: 1 PID: 8783 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 189.636656][ T8783] Kernel panic - not syncing: panic_on_warn set ... [ 189.643242][ T8783] CPU: 1 PID: 8783 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190826 #73 [ 189.652256][ T8783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.662310][ T8783] Call Trace: [ 189.665600][ T8783] dump_stack+0x172/0x1f0 [ 189.669939][ T8783] ? debug_print_object+0x90/0x250 [ 189.675053][ T8783] panic+0x2dc/0x755 [ 189.678956][ T8783] ? add_taint.cold+0x16/0x16 [ 189.683644][ T8783] ? __kasan_check_write+0x14/0x20 [ 189.688755][ T8783] ? __warn.cold+0x14/0x3c [ 189.693183][ T8783] ? debug_print_object+0x168/0x250 [ 189.698656][ T8783] __warn.cold+0x2f/0x3c [ 189.702903][ T8783] ? debug_print_object+0x168/0x250 [ 189.708105][ T8783] report_bug+0x289/0x300 [ 189.712446][ T8783] do_error_trap+0x11b/0x200 [ 189.717044][ T8783] do_invalid_op+0x37/0x50 [ 189.721460][ T8783] ? debug_print_object+0x168/0x250 [ 189.726662][ T8783] invalid_op+0x23/0x30 [ 189.730819][ T8783] RIP: 0010:debug_print_object+0x168/0x250 [ 189.736621][ T8783] Code: dd 60 6c e6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 6c e6 87 48 c7 c7 c0 61 e6 87 e8 20 31 01 fe <0f> 0b 83 05 f3 67 83 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 189.755647][ T3892] kobject: 'loop2' (000000002bef199b): kobject_uevent_env [ 189.756224][ T8783] RSP: 0018:ffff88805f03f938 EFLAGS: 00010086 [ 189.769437][ T8783] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 189.777391][ T8783] RDX: 0000000000040000 RSI: ffffffff815bd606 RDI: ffffed100be07f19 [ 189.785343][ T8783] RBP: ffff88805f03f978 R08: ffff88805f036040 R09: ffffed1015d24109 [ 189.793298][ T8783] R10: ffffed1015d24108 R11: ffff8880ae920847 R12: 0000000000000001 [ 189.801252][ T8783] R13: ffffffff8935e800 R14: 0000000000000000 R15: ffff8880a8681a80 [ 189.814953][ T8783] ? vprintk_func+0x86/0x189 [ 189.819527][ T8783] ? debug_print_object+0x168/0x250 [ 189.824712][ T8783] debug_check_no_obj_freed+0x2d4/0x43f [ 189.830253][ T8783] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 189.835783][ T8783] kfree+0xf8/0x2c0 [ 189.839574][ T8783] ext4_fill_super+0x8cb/0xcc80 [ 189.844424][ T8783] ? ext4_calculate_overhead+0x1250/0x1250 [ 189.850221][ T8783] ? vsprintf+0x40/0x40 [ 189.854364][ T8783] ? wait_for_completion+0x440/0x440 [ 189.859629][ T8783] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 189.865328][ T8783] ? set_blocksize+0x2bf/0x340 [ 189.870075][ T8783] mount_bdev+0x304/0x3c0 [ 189.874383][ T8783] ? mount_bdev+0x304/0x3c0 [ 189.878868][ T8783] ? ext4_calculate_overhead+0x1250/0x1250 [ 189.884655][ T8783] ext4_mount+0x35/0x40 [ 189.888792][ T8783] ? ext4_nfs_get_inode+0xe0/0xe0 [ 189.893810][ T8783] legacy_get_tree+0x113/0x220 [ 189.898551][ T8783] ? ns_capable_common+0x93/0x100 [ 189.903558][ T8783] vfs_get_tree+0x8f/0x380 [ 189.907956][ T8783] do_mount+0x13b3/0x1c30 [ 189.912269][ T8783] ? copy_mount_string+0x40/0x40 [ 189.917212][ T8783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.923434][ T8783] ? copy_mount_options+0x2e8/0x3f0 [ 189.928616][ T8783] ksys_mount+0xdb/0x150 [ 189.932843][ T8783] __x64_sys_mount+0xbe/0x150 [ 189.937505][ T8783] do_syscall_64+0xfa/0x760 [ 189.941990][ T8783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.947859][ T8783] RIP: 0033:0x45c2ca [ 189.951734][ T8783] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 189.971314][ T8783] RSP: 002b:00007ff8a2340a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 189.979788][ T8783] RAX: ffffffffffffffda RBX: 00007ff8a2340b40 RCX: 000000000045c2ca [ 189.987757][ T8783] RDX: 00007ff8a2340ae0 RSI: 0000000020000000 RDI: 00007ff8a2340b00 [ 189.995707][ T8783] RBP: 0000000000001000 R08: 00007ff8a2340b40 R09: 00007ff8a2340ae0 [ 190.003659][ T8783] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000003 [ 190.011608][ T8783] R13: 00000000004c89d6 R14: 00000000004df8f8 R15: 00000000ffffffff [ 190.021067][ T8783] Kernel Offset: disabled [ 190.025547][ T8783] Rebooting in 86400 seconds..