[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 33.221303][ T26] audit: type=1800 audit(1572816361.020:25): pid=7049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 33.259230][ T26] audit: type=1800 audit(1572816361.020:26): pid=7049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 33.279554][ T26] audit: type=1800 audit(1572816361.020:27): pid=7049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.35' (ECDSA) to the list of known hosts. 2019/11/03 21:26:10 fuzzer started 2019/11/03 21:26:11 dialing manager at 10.128.0.105:42255 2019/11/03 21:26:11 checking machine... 2019/11/03 21:26:11 checking revisions... 2019/11/03 21:26:11 testing simple program... syzkaller login: [ 43.943622][ T7220] IPVS: ftp: loaded support on port[0] = 21 2019/11/03 21:26:11 building call list... executing program [ 47.788210][ T7216] can: request_module (can-proto-0) failed. [ 47.801236][ T7216] can: request_module (can-proto-0) failed. [ 47.813731][ T7216] can: request_module (can-proto-7) failed. [ 47.825925][ T7216] can: request_module (can-proto-0) failed. 2019/11/03 21:26:17 syscalls: 2553 2019/11/03 21:26:17 code coverage: enabled 2019/11/03 21:26:17 comparison tracing: enabled 2019/11/03 21:26:17 extra coverage: extra coverage is not supported by the kernel 2019/11/03 21:26:17 setuid sandbox: enabled 2019/11/03 21:26:17 namespace sandbox: enabled 2019/11/03 21:26:17 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 21:26:17 fault injection: enabled 2019/11/03 21:26:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 21:26:17 net packet injection: enabled 2019/11/03 21:26:17 net device setup: enabled 2019/11/03 21:26:17 concurrency sanitizer: enabled 2019/11/03 21:26:17 devlink PCI setup: PCI device 0000:00:10.0 is not available 21:26:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x3be}, 0x28) 21:26:18 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x75d) sendto(r0, &(0x7f0000000000)='N', 0x1, 0xfffffffffffffffe, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)="8c", 0x1}], 0x1}, 0x0) [ 50.583320][ T7265] IPVS: ftp: loaded support on port[0] = 21 [ 50.721299][ T7265] chnl_net:caif_netlink_parms(): no params data found [ 50.813134][ T7265] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.827453][ T7265] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.835336][ T7265] device bridge_slave_0 entered promiscuous mode [ 50.843303][ T7265] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.851279][ T7265] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.859648][ T7265] device bridge_slave_1 entered promiscuous mode [ 50.875851][ T7268] IPVS: ftp: loaded support on port[0] = 21 [ 50.883637][ T7265] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.894983][ T7265] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.924051][ T7265] team0: Port device team_slave_0 added [ 50.933872][ T7265] team0: Port device team_slave_1 added 21:26:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 51.039812][ T7265] device hsr_slave_0 entered promiscuous mode [ 51.077135][ T7265] device hsr_slave_1 entered promiscuous mode [ 51.169370][ T7270] IPVS: ftp: loaded support on port[0] = 21 [ 51.235874][ T7265] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.242990][ T7265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.250389][ T7265] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.257555][ T7265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.333954][ T7268] chnl_net:caif_netlink_parms(): no params data found [ 51.467825][ T7265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.520895][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.557686][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.587843][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.603542][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 51.659680][ T7265] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.695806][ T7268] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.706799][ T7268] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.746782][ T7268] device bridge_slave_0 entered promiscuous mode [ 51.791445][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.800465][ T3006] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.807593][ T3006] bridge0: port 1(bridge_slave_0) entered forwarding state 21:26:19 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(r0, &(0x7f0000000000)=""/43, 0x2b) [ 51.833642][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.871817][ T3006] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.878926][ T3006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.926111][ T7268] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.933811][ T7268] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.957782][ T7268] device bridge_slave_1 entered promiscuous mode [ 52.008486][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.024749][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.067711][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.096733][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.105797][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.148048][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.187005][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.195715][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.247799][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.268522][ T7265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.290239][ T7270] chnl_net:caif_netlink_parms(): no params data found [ 52.340008][ T7265] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.358865][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.368168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 52.375668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 52.428836][ T7268] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.454770][ T7268] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.501922][ T7299] IPVS: ftp: loaded support on port[0] = 21 [ 52.596236][ T7270] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.626956][ T7270] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.634969][ T7270] device bridge_slave_0 entered promiscuous mode [ 52.670186][ T7270] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.707111][ T7270] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.715149][ T7270] device bridge_slave_1 entered promiscuous mode [ 52.749201][ T7268] team0: Port device team_slave_0 added [ 52.821266][ T7268] team0: Port device team_slave_1 added 21:26:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x4000800, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 52.969222][ T7270] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.039942][ T7268] device hsr_slave_0 entered promiscuous mode [ 53.077068][ T7268] device hsr_slave_1 entered promiscuous mode 21:26:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x3be}, 0x28) [ 53.116745][ T7268] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.125676][ T7270] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.339393][ T7270] team0: Port device team_slave_0 added [ 53.409453][ T7270] team0: Port device team_slave_1 added [ 53.533089][ T7299] chnl_net:caif_netlink_parms(): no params data found [ 53.720408][ T7270] device hsr_slave_0 entered promiscuous mode [ 53.809616][ T7270] device hsr_slave_1 entered promiscuous mode [ 53.838999][ T7270] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.897457][ T7324] IPVS: ftp: loaded support on port[0] = 21 [ 54.008137][ T7268] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.241152][ T7299] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.256811][ T7299] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.305559][ T7299] device bridge_slave_0 entered promiscuous mode [ 54.376565][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.399213][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.449081][ T7268] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.465166][ T7299] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.472994][ T7299] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.507640][ T7299] device bridge_slave_1 entered promiscuous mode [ 54.568934][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.597748][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.627625][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.634840][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.765474][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.777757][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.819017][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.867289][ T3006] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.874370][ T3006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.927506][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.968069][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.008714][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.047933][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.097619][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.128310][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.224088][ T7268] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.285372][ T7268] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.340837][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.349704][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.387600][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.437030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.445865][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.511900][ T7299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.634964][ T7270] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.675979][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.694216][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 55.734136][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 55.776159][ T7299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.799693][ T7268] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.844308][ T7270] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.884383][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.893102][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.954391][ T7324] chnl_net:caif_netlink_parms(): no params data found [ 55.983879][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.993440][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.022921][ T7280] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.030155][ T7280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.077553][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.107348][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 21:26:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x3be}, 0x28) [ 56.126399][ T7280] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.133570][ T7280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.157492][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 21:26:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x3be}, 0x28) [ 56.248063][ T7299] team0: Port device team_slave_0 added [ 56.314979][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.324389][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.378348][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.439815][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.479243][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 21:26:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffef79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x57d, 0x0, 0x3be}, 0x28) [ 56.528199][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.578770][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.640805][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.683504][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.757616][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.767607][ T7270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.813081][ T7299] team0: Port device team_slave_1 added [ 56.975205][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.009173][ T7270] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.090241][ T7299] device hsr_slave_0 entered promiscuous mode [ 57.120819][ T7299] device hsr_slave_1 entered promiscuous mode 21:26:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f0000000a40), 0x8000000000000b0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0xffffffffffffff7e) sched_setattr(0x0, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r6 = accept(r5, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0xfffffffffffffcd1) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000240)) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xcd4]}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70e000}}}) r7 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r7, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) ioctl$VIDIOC_CREATE_BUFS(r7, 0xc058565d, &(0x7f0000000300)={0x0, 0x0, 0x2, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70e000}}}) lchown(0x0, 0xffffffffffffffff, 0x0) sendmmsg$unix(r6, &(0x7f0000001840)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}], 0x1, 0x40430) [ 57.186829][ T7299] debugfs: Directory 'hsr0' with parent '/' already present! [ 57.194401][ T7324] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.228527][ T7324] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.270738][ T7324] device bridge_slave_0 entered promiscuous mode 21:26:25 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x75d) sendto(r0, &(0x7f0000000000)='N', 0x1, 0xfffffffffffffffe, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)="8c", 0x1}], 0x1}, 0x0) [ 57.337567][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 57.345091][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 57.472276][ T7375] IPVS: ftp: loaded support on port[0] = 21 [ 57.512494][ T7324] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.522178][ T7324] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.581288][ T7324] device bridge_slave_1 entered promiscuous mode [ 57.924318][ T7324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 21:26:25 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x75d) sendto(r0, &(0x7f0000000000)='N', 0x1, 0xfffffffffffffffe, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)="8c", 0x1}], 0x1}, 0x0) [ 58.031161][ T7324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.286872][ T7324] team0: Port device team_slave_0 added [ 58.294182][ T7324] team0: Port device team_slave_1 added 21:26:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f0000000a40), 0x8000000000000b0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0xffffffffffffff7e) sched_setattr(0x0, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r6 = accept(r5, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0xfffffffffffffcd1) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000240)) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xcd4]}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70e000}}}) r7 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r7, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) ioctl$VIDIOC_CREATE_BUFS(r7, 0xc058565d, &(0x7f0000000300)={0x0, 0x0, 0x2, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70e000}}}) lchown(0x0, 0xffffffffffffffff, 0x0) sendmmsg$unix(r6, &(0x7f0000001840)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}], 0x1, 0x40430) 21:26:26 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x75d) sendto(r0, &(0x7f0000000000)='N', 0x1, 0xfffffffffffffffe, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)="8c", 0x1}], 0x1}, 0x0) [ 58.539745][ T7324] device hsr_slave_0 entered promiscuous mode [ 58.597294][ T7324] device hsr_slave_1 entered promiscuous mode [ 58.636842][ T7324] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.890974][ T7435] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 58.916960][ T7299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.059587][ T7299] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.098375][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.133481][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.232468][ T7375] chnl_net:caif_netlink_parms(): no params data found 21:26:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f0000000a40), 0x8000000000000b0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0xffffffffffffff7e) sched_setattr(0x0, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r6 = accept(r5, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0xfffffffffffffcd1) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000240)) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xcd4]}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70e000}}}) r7 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r7, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) ioctl$VIDIOC_CREATE_BUFS(r7, 0xc058565d, &(0x7f0000000300)={0x0, 0x0, 0x2, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70e000}}}) lchown(0x0, 0xffffffffffffffff, 0x0) sendmmsg$unix(r6, &(0x7f0000001840)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}], 0x1, 0x40430) [ 59.297641][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.330965][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.416286][ T7280] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.423447][ T7280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.537371][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.606445][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.657722][ T7280] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.664868][ T7280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.821696][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.024549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.040093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.081795][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.129826][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.178035][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.220147][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.278422][ T7299] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 60.319769][ T7299] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.372678][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.389127][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.429596][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.482289][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.550799][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.637153][ T7324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.678928][ T7299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.686458][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.700414][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.739023][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.760350][ T7324] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.807486][ T7375] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.814601][ T7375] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.867763][ T7375] device bridge_slave_0 entered promiscuous mode [ 60.927702][ T7375] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.934773][ T7375] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.997755][ T7375] device bridge_slave_1 entered promiscuous mode [ 61.037450][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.045290][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.150098][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.190567][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.258896][ T7280] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.265980][ T7280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.330874][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.392138][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.451716][ T7280] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.458835][ T7280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.482675][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.542557][ T7280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.647658][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.667375][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.727454][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.782451][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.832205][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.872321][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.927454][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.002026][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.037562][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.099720][ T7375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.138124][ T7324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.145958][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.173149][ T7375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.291938][ T7324] IPv6: nlmon0: Failed to add prefix route for address fe80::25; dropping [ 62.393440][ T7375] team0: Port device team_slave_0 added [ 62.412900][ T7375] team0: Port device team_slave_1 added [ 62.461163][ T7324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.562513][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 62.591363][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 21:26:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(r0, &(0x7f0000000000)=""/43, 0x2b) [ 62.659893][ T7375] device hsr_slave_0 entered promiscuous mode [ 62.697144][ T7375] device hsr_slave_1 entered promiscuous mode [ 62.736756][ T7375] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.409960][ T7525] ================================================================== [ 63.418100][ T7525] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 63.425635][ T7525] [ 63.427961][ T7525] read to 0xffff88812a371838 of 2 bytes by task 7517 on cpu 0: [ 63.435502][ T7525] pid_update_inode+0x25/0x70 [ 63.440185][ T7525] pid_revalidate+0x91/0xd0 [ 63.444685][ T7525] lookup_fast+0x6f2/0x700 [ 63.449110][ T7525] walk_component+0x6d/0xe80 [ 63.453693][ T7525] link_path_walk.part.0+0x5d3/0xa90 [ 63.458976][ T7525] path_openat+0x14f/0x36e0 [ 63.463487][ T7525] do_filp_open+0x11e/0x1b0 [ 63.467991][ T7525] do_sys_open+0x3b3/0x4f0 [ 63.472412][ T7525] __x64_sys_open+0x55/0x70 [ 63.476936][ T7525] do_syscall_64+0xcc/0x370 [ 63.481454][ T7525] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.487331][ T7525] [ 63.489660][ T7525] write to 0xffff88812a371838 of 2 bytes by task 7525 on cpu 1: [ 63.497280][ T7525] pid_update_inode+0x51/0x70 [ 63.501949][ T7525] pid_revalidate+0x91/0xd0 [ 63.506445][ T7525] lookup_fast+0x6f2/0x700 [ 63.510863][ T7525] walk_component+0x6d/0xe80 [ 63.515449][ T7525] path_lookupat.isra.0+0x13a/0x5a0 [ 63.520641][ T7525] filename_lookup+0x145/0x2b0 [ 63.525399][ T7525] user_path_at_empty+0x4c/0x70 [ 63.530239][ T7525] vfs_statx+0xd9/0x190 [ 63.534387][ T7525] __do_sys_newstat+0x51/0xb0 [ 63.539056][ T7525] __x64_sys_newstat+0x3a/0x50 [ 63.543817][ T7525] do_syscall_64+0xcc/0x370 [ 63.548314][ T7525] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.554205][ T7525] [ 63.556522][ T7525] Reported by Kernel Concurrency Sanitizer on: [ 63.562668][ T7525] CPU: 1 PID: 7525 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 63.569419][ T7525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.579480][ T7525] ================================================================== [ 63.587531][ T7525] Kernel panic - not syncing: panic_on_warn set ... [ 63.594124][ T7525] CPU: 1 PID: 7525 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 63.600873][ T7525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.610921][ T7525] Call Trace: [ 63.614213][ T7525] dump_stack+0xf5/0x159 [ 63.618459][ T7525] panic+0x210/0x640 [ 63.622356][ T7525] ? __do_sys_newstat+0x51/0xb0 [ 63.627222][ T7525] ? vprintk_func+0x8d/0x140 [ 63.631814][ T7525] kcsan_report.cold+0xc/0x10 [ 63.636486][ T7525] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 63.642025][ T7525] ? task_dump_owner+0xf7/0x260 [ 63.646872][ T7525] __tsan_write2+0x32/0x40 [ 63.651283][ T7525] pid_update_inode+0x51/0x70 [ 63.655959][ T7525] pid_revalidate+0x91/0xd0 [ 63.660462][ T7525] lookup_fast+0x6f2/0x700 [ 63.664886][ T7525] walk_component+0x6d/0xe80 [ 63.669479][ T7525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 63.675725][ T7525] ? link_path_walk.part.0+0x77f/0xa90 [ 63.681211][ T7525] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.686850][ T7525] path_lookupat.isra.0+0x13a/0x5a0 [ 63.692049][ T7525] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.697680][ T7525] filename_lookup+0x145/0x2b0 [ 63.702442][ T7525] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.708078][ T7525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 63.714311][ T7525] ? strncpy_from_user+0x219/0x2b0 [ 63.719425][ T7525] user_path_at_empty+0x4c/0x70 [ 63.724272][ T7525] vfs_statx+0xd9/0x190 [ 63.728429][ T7525] __do_sys_newstat+0x51/0xb0 [ 63.733102][ T7525] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.738729][ T7525] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.744350][ T7525] ? __tsan_read4+0x2c/0x30 [ 63.748847][ T7525] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.754469][ T7525] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.760090][ T7525] ? __tsan_read8+0x2c/0x30 [ 63.764597][ T7525] __x64_sys_newstat+0x3a/0x50 [ 63.769358][ T7525] do_syscall_64+0xcc/0x370 [ 63.773861][ T7525] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.779748][ T7525] RIP: 0033:0x7f8f54846c65 [ 63.784161][ T7525] Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 90 90 90 90 90 90 90 90 83 ff 01 48 89 f0 77 18 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 63.803757][ T7525] RSP: 002b:00007ffe5b466f38 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 63.812165][ T7525] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f8f54846c65 [ 63.820133][ T7525] RDX: 00007f8f54d14c60 RSI: 00007f8f54d14c60 RDI: 0000000002470220 [ 63.828098][ T7525] RBP: 0000000000020062 R08: 00007f8f54afc5a0 R09: 0000000000000000 [ 63.836064][ T7525] R10: 1999999999999999 R11: 0000000000000246 R12: 0000000002470220 [ 63.844027][ T7525] R13: 00000000024701c0 R14: 0000000000000005 R15: 0000000000000000 [ 63.853187][ T7525] Kernel Offset: disabled [ 63.857505][ T7525] Rebooting in 86400 seconds..