Warning: Permanently added '10.128.0.43' (ECDSA) to the list of known hosts. 2019/10/14 09:34:58 fuzzer started 2019/10/14 09:35:00 dialing manager at 10.128.0.105:43961 2019/10/14 09:35:00 syscalls: 2523 2019/10/14 09:35:00 code coverage: enabled 2019/10/14 09:35:00 comparison tracing: enabled 2019/10/14 09:35:00 extra coverage: extra coverage is not supported by the kernel 2019/10/14 09:35:00 setuid sandbox: enabled 2019/10/14 09:35:00 namespace sandbox: enabled 2019/10/14 09:35:00 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/14 09:35:00 fault injection: enabled 2019/10/14 09:35:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/14 09:35:00 net packet injection: enabled 2019/10/14 09:35:00 net device setup: enabled 2019/10/14 09:35:00 concurrency sanitizer: enabled 09:35:02 executing program 0: perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(0xffffffffffffffff, 0x0, 0x200) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000140)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000002000}) setxattr(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)=@random={'osx.', '/dev/vga_arbiter\x00'}, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000200)='./file2\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "9b4b0a3133cc19889ecd683ab21da67f"}, 0x11, 0x2) r2 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(r2, 0x0, 0x200) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000300)="5d65cc4bb49f73cd2f7fee6a812e3dfb3886f90d4a15642bdd78d16b90d78e572e8e65094c399c75def4024421f4c963d760abe43971e0ee175538601f59e119c397c5f2db") ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) gin: [ 50.891384][ T7283] IPVS: ftp: loaded support on port[0] = 21 [ 50.984759][ T7283] chnl_net:caif_netlink_parms(): no params data found 09:35:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x800, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000580)="f948fac3e8138e6575ad4edf55ecc0fc2be24af7f0bbe4289ca12c041c5e5856280efc44d5bb9c5a41bacafaf22dd25d7d23f58bcab29ed095cbf2113045a5b08f42be8197d3c0670157f1a056eab215ec89e88d398a687986cbb714000001000000000054be58d73020f2f6af2b0f314f17ea", 0xffffffe4) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 51.025577][ T7283] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.039902][ T7283] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.049518][ T7283] device bridge_slave_0 entered promiscuous mode [ 51.072765][ T7283] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.079903][ T7283] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.088111][ T7283] device bridge_slave_1 entered promiscuous mode [ 51.136941][ T7283] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.163047][ T7283] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.205763][ T7283] team0: Port device team_slave_0 added [ 51.222704][ T7283] team0: Port device team_slave_1 added [ 51.246095][ T7286] IPVS: ftp: loaded support on port[0] = 21 09:35:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 51.395165][ T7283] device hsr_slave_0 entered promiscuous mode [ 51.451828][ T7283] device hsr_slave_1 entered promiscuous mode [ 51.539661][ T7283] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.546790][ T7283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.554153][ T7283] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.561237][ T7283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.629950][ T7288] IPVS: ftp: loaded support on port[0] = 21 09:35:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") bpf$MAP_CREATE(0x0, &(0x7f0000002e40)={0x12, 0x97, 0x4, 0x70}, 0x3c) [ 51.722928][ T7283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.764187][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.792744][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.813831][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.827036][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 51.863466][ T7283] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.873315][ T7286] chnl_net:caif_netlink_parms(): no params data found [ 51.904578][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.914796][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.921888][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.963497][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.974520][ T3022] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.981616][ T3022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.024119][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.034382][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.044818][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.055477][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.066772][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.083016][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.102351][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.121081][ T7283] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 09:35:03 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 52.133015][ T7283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.178268][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.188243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.198786][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.221895][ T7286] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.229061][ T7286] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.240434][ T7294] IPVS: ftp: loaded support on port[0] = 21 [ 52.253770][ T7286] device bridge_slave_0 entered promiscuous mode [ 52.294125][ T7286] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.301254][ T7286] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.311197][ T7286] device bridge_slave_1 entered promiscuous mode [ 52.322029][ T7283] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.344796][ T7288] chnl_net:caif_netlink_parms(): no params data found [ 52.425378][ T7286] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.459482][ T7286] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:35:04 executing program 5: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x7f, 0x40, 0x3, 0x8}, {0x1, 0x0, 0x8, 0x3e00000000000000}, {0x0, 0x7, 0x1c, 0x3}, {0x80000001, 0x7ec3, 0x0, 0x3}, {0x0, 0x2}]}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 52.616585][ T7288] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.633672][ T7300] IPVS: ftp: loaded support on port[0] = 21 [ 52.651531][ T7288] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.659511][ T7288] device bridge_slave_0 entered promiscuous mode [ 52.690930][ T7288] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.700227][ T7288] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.708499][ T7288] device bridge_slave_1 entered promiscuous mode [ 52.716220][ T7286] team0: Port device team_slave_0 added [ 52.730838][ T7294] chnl_net:caif_netlink_parms(): no params data found [ 52.754279][ T7307] overlayfs: lowerdir is in-use as upperdir/workdir [ 52.765341][ T7286] team0: Port device team_slave_1 added [ 52.783158][ T7288] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.783463][ C0] hrtimer: interrupt took 35839 ns [ 52.803280][ T7288] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.858784][ T7307] overlayfs: workdir and upperdir must reside under the same mount 09:35:04 executing program 0: perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(0xffffffffffffffff, 0x0, 0x200) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000140)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000002000}) setxattr(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)=@random={'osx.', '/dev/vga_arbiter\x00'}, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000200)='./file2\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "9b4b0a3133cc19889ecd683ab21da67f"}, 0x11, 0x2) r2 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(r2, 0x0, 0x200) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000300)="5d65cc4bb49f73cd2f7fee6a812e3dfb3886f90d4a15642bdd78d16b90d78e572e8e65094c399c75def4024421f4c963d760abe43971e0ee175538601f59e119c397c5f2db") ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) [ 52.902019][ T7288] team0: Port device team_slave_0 added [ 52.994525][ T7286] device hsr_slave_0 entered promiscuous mode [ 53.051991][ T7286] device hsr_slave_1 entered promiscuous mode [ 53.066938][ T7312] overlayfs: lowerdir is in-use as upperdir/workdir 09:35:04 executing program 0: perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(0xffffffffffffffff, 0x0, 0x200) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000140)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000002000}) setxattr(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)=@random={'osx.', '/dev/vga_arbiter\x00'}, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000200)='./file2\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "9b4b0a3133cc19889ecd683ab21da67f"}, 0x11, 0x2) r2 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(r2, 0x0, 0x200) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000300)="5d65cc4bb49f73cd2f7fee6a812e3dfb3886f90d4a15642bdd78d16b90d78e572e8e65094c399c75def4024421f4c963d760abe43971e0ee175538601f59e119c397c5f2db") ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) [ 53.092413][ T7286] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.100985][ T7288] team0: Port device team_slave_1 added [ 53.110546][ T7294] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.119923][ T7294] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.128306][ T7294] device bridge_slave_0 entered promiscuous mode [ 53.186739][ T7294] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.196283][ T7294] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.222652][ T7294] device bridge_slave_1 entered promiscuous mode [ 53.229628][ T7316] overlayfs: lowerdir is in-use as upperdir/workdir 09:35:04 executing program 0: perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(0xffffffffffffffff, 0x0, 0x200) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000140)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000002000}) setxattr(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)=@random={'osx.', '/dev/vga_arbiter\x00'}, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000200)='./file2\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "9b4b0a3133cc19889ecd683ab21da67f"}, 0x11, 0x2) r2 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(r2, 0x0, 0x200) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000300)="5d65cc4bb49f73cd2f7fee6a812e3dfb3886f90d4a15642bdd78d16b90d78e572e8e65094c399c75def4024421f4c963d760abe43971e0ee175538601f59e119c397c5f2db") ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) [ 53.249323][ T7309] IPVS: ftp: loaded support on port[0] = 21 [ 53.304765][ T7288] device hsr_slave_0 entered promiscuous mode [ 53.342408][ T7288] device hsr_slave_1 entered promiscuous mode [ 53.365178][ T7319] overlayfs: lowerdir is in-use as upperdir/workdir [ 53.382096][ T7288] debugfs: Directory 'hsr0' with parent '/' already present! 09:35:04 executing program 0: perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(0xffffffffffffffff, 0x0, 0x200) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000140)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000002000}) setxattr(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)=@random={'osx.', '/dev/vga_arbiter\x00'}, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000200)='./file2\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "9b4b0a3133cc19889ecd683ab21da67f"}, 0x11, 0x2) r2 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(r2, 0x0, 0x200) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000300)="5d65cc4bb49f73cd2f7fee6a812e3dfb3886f90d4a15642bdd78d16b90d78e572e8e65094c399c75def4024421f4c963d760abe43971e0ee175538601f59e119c397c5f2db") ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) [ 53.450865][ T7294] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.533640][ T7286] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.546477][ T7288] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.559624][ T7294] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.560496][ T7324] overlayfs: lowerdir is in-use as upperdir/workdir [ 53.588251][ T7286] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.608108][ T7288] 8021q: adding VLAN 0 to HW filter on device team0 09:35:05 executing program 0: perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(0xffffffffffffffff, 0x0, 0x200) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000140)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000002000}) setxattr(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)=@random={'osx.', '/dev/vga_arbiter\x00'}, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000200)='./file2\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "9b4b0a3133cc19889ecd683ab21da67f"}, 0x11, 0x2) r2 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(r2, 0x0, 0x200) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000300)="5d65cc4bb49f73cd2f7fee6a812e3dfb3886f90d4a15642bdd78d16b90d78e572e8e65094c399c75def4024421f4c963d760abe43971e0ee175538601f59e119c397c5f2db") ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) [ 53.635993][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.644179][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.658263][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.666766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.740423][ T7286] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.752439][ T7326] overlayfs: lowerdir is in-use as upperdir/workdir [ 53.755332][ T7286] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 09:35:05 executing program 0: perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(0xffffffffffffffff, 0x0, 0x200) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000140)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000002000}) setxattr(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)=@random={'osx.', '/dev/vga_arbiter\x00'}, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000200)='./file2\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "9b4b0a3133cc19889ecd683ab21da67f"}, 0x11, 0x2) r2 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(r2, 0x0, 0x200) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000300)="5d65cc4bb49f73cd2f7fee6a812e3dfb3886f90d4a15642bdd78d16b90d78e572e8e65094c399c75def4024421f4c963d760abe43971e0ee175538601f59e119c397c5f2db") ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) [ 53.792289][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.801405][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.815906][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.823042][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.835540][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.844573][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.859047][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.866223][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.891101][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.903743][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.915599][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.925957][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.928377][ T7331] overlayfs: lowerdir is in-use as upperdir/workdir [ 53.933079][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.934248][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.960724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.969522][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.976600][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state 09:35:05 executing program 0: perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(0xffffffffffffffff, 0x0, 0x200) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000140)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000002000}) setxattr(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)=@random={'osx.', '/dev/vga_arbiter\x00'}, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000200)='./file2\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "9b4b0a3133cc19889ecd683ab21da67f"}, 0x11, 0x2) r2 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(r2, 0x0, 0x200) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000300)="5d65cc4bb49f73cd2f7fee6a812e3dfb3886f90d4a15642bdd78d16b90d78e572e8e65094c399c75def4024421f4c963d760abe43971e0ee175538601f59e119c397c5f2db") ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) [ 53.988435][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.998010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.011008][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.020183][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.032674][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.045907][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.058209][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.069647][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.081350][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.115370][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.119763][ T7334] overlayfs: lowerdir is in-use as upperdir/workdir [ 54.124649][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.144238][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.155462][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.165688][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.176186][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.186326][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.202113][ T7300] chnl_net:caif_netlink_parms(): no params data found [ 54.215463][ T7288] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.228475][ T7288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.237512][ T7294] team0: Port device team_slave_0 added [ 54.246746][ T7294] team0: Port device team_slave_1 added [ 54.265749][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.274344][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.286498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.296640][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.305260][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.313415][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.382120][ T7309] chnl_net:caif_netlink_parms(): no params data found [ 54.400379][ T7300] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.407810][ T7300] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.417027][ T7300] device bridge_slave_0 entered promiscuous mode [ 54.428111][ T7300] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.435278][ T7300] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.443344][ T7300] device bridge_slave_1 entered promiscuous mode [ 54.460953][ T7288] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.544279][ T7294] device hsr_slave_0 entered promiscuous mode [ 54.602007][ T7294] device hsr_slave_1 entered promiscuous mode [ 54.641948][ T7294] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.669298][ T7309] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.676508][ T7309] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.687570][ T7309] device bridge_slave_0 entered promiscuous mode [ 54.697611][ T7300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.708784][ T7286] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.717478][ T7309] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.731558][ T7309] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.739798][ T7309] device bridge_slave_1 entered promiscuous mode [ 54.764157][ T7300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.794444][ T7309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.816956][ T7309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.832601][ T7300] team0: Port device team_slave_0 added [ 54.840873][ T7300] team0: Port device team_slave_1 added [ 54.897494][ T7309] team0: Port device team_slave_0 added [ 54.924159][ T7309] team0: Port device team_slave_1 added [ 55.003934][ T7300] device hsr_slave_0 entered promiscuous mode [ 55.016568][ T7354] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 55.022427][ T7300] device hsr_slave_1 entered promiscuous mode [ 55.091673][ T7300] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.122355][ T7294] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.155839][ T7300] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.163039][ T7300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.170495][ T7300] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.177564][ T7300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.251330][ T7309] device hsr_slave_0 entered promiscuous mode [ 55.318201][ T7309] device hsr_slave_1 entered promiscuous mode [ 55.358958][ T7356] ================================================================== [ 55.367126][ T7356] BUG: KCSAN: data-race in __splice_from_pipe / pipe_poll [ 55.374269][ T7356] [ 55.376604][ T7356] read to 0xffff888103e7f0f8 of 4 bytes by task 7351 on cpu 1: [ 55.384155][ T7356] pipe_poll+0x84/0x1d0 [ 55.388312][ T7356] do_select+0x7d0/0x1020 [ 55.392649][ T7356] core_sys_select+0x38b/0x520 [ 55.397409][ T7356] __x64_sys_pselect6+0x22a/0x280 [ 55.402427][ T7356] do_syscall_64+0xcf/0x2f0 [ 55.408147][ T7356] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.414015][ T7356] [ 55.416414][ T7356] write to 0xffff888103e7f0f8 of 4 bytes by task 7356 on cpu 0: [ 55.424098][ T7356] __splice_from_pipe+0x3ce/0x480 [ 55.429144][ T7356] do_vmsplice.part.0+0x1c5/0x210 [ 55.434579][ T7356] __do_sys_vmsplice+0x15f/0x1c0 [ 55.439496][ T7356] __x64_sys_vmsplice+0x5e/0x80 [ 55.444328][ T7356] do_syscall_64+0xcf/0x2f0 [ 55.449771][ T7356] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.455637][ T7356] [ 55.457968][ T7356] Reported by Kernel Concurrency Sanitizer on: [ 55.464458][ T7356] CPU: 0 PID: 7356 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 55.471895][ T7356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.481944][ T7356] ================================================================== [ 55.489992][ T7356] Kernel panic - not syncing: panic_on_warn set ... [ 55.496746][ T7356] CPU: 0 PID: 7356 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 55.504535][ T7356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.515091][ T7356] Call Trace: [ 55.518368][ T7356] dump_stack+0xf5/0x159 [ 55.522602][ T7356] panic+0x209/0x639 [ 55.526497][ T7356] ? vprintk_func+0x8d/0x140 [ 55.531091][ T7356] kcsan_report.cold+0xc/0x1b [ 55.535776][ T7356] __kcsan_setup_watchpoint+0x3ee/0x510 [ 55.541303][ T7356] __tsan_write4+0x32/0x40 [ 55.545703][ T7356] __splice_from_pipe+0x3ce/0x480 [ 55.550798][ T7356] ? iter_to_pipe+0x3f0/0x3f0 [ 55.555562][ T7356] do_vmsplice.part.0+0x1c5/0x210 [ 55.560570][ T7356] __do_sys_vmsplice+0x15f/0x1c0 [ 55.565501][ T7356] ? __tsan_read8+0x2c/0x30 [ 55.570167][ T7356] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 55.575864][ T7356] ? __kcsan_setup_watchpoint+0x96/0x510 [ 55.581481][ T7356] ? _copy_to_user+0x84/0xb0 [ 55.586083][ T7356] ? __kcsan_setup_watchpoint+0x96/0x510 [ 55.591707][ T7356] ? __kcsan_setup_watchpoint+0x96/0x510 [ 55.597447][ T7356] __x64_sys_vmsplice+0x5e/0x80 [ 55.602295][ T7356] do_syscall_64+0xcf/0x2f0 [ 55.606789][ T7356] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.612662][ T7356] RIP: 0033:0x459a59 [ 55.616543][ T7356] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 55.636129][ T7356] RSP: 002b:00007fcd9aab4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 55.644517][ T7356] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a59 [ 55.652939][ T7356] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000005 [ 55.660905][ T7356] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 55.668858][ T7356] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd9aab56d4 [ 55.676816][ T7356] R13: 00000000004c94e5 R14: 00000000004e0c68 R15: 00000000ffffffff [ 55.686308][ T7356] Kernel Offset: disabled [ 55.690628][ T7356] Rebooting in 86400 seconds..