Warning: Permanently added '10.128.1.2' (ECDSA) to the list of known hosts. 2019/12/11 14:41:54 fuzzer started 2019/12/11 14:41:56 dialing manager at 10.128.0.105:44805 2019/12/11 14:41:58 syscalls: 2689 2019/12/11 14:41:58 code coverage: enabled 2019/12/11 14:41:58 comparison tracing: enabled 2019/12/11 14:41:58 extra coverage: extra coverage is not supported by the kernel 2019/12/11 14:41:58 setuid sandbox: enabled 2019/12/11 14:41:58 namespace sandbox: enabled 2019/12/11 14:41:58 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/11 14:41:58 fault injection: enabled 2019/12/11 14:41:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/11 14:41:58 net packet injection: enabled 2019/12/11 14:41:58 net device setup: enabled 2019/12/11 14:41:58 concurrency sanitizer: enabled 2019/12/11 14:41:58 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 61.564685][ T7637] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/11 14:42:03 adding functions to KCSAN blacklist: 'tick_nohz_next_event' 'rcu_gp_fqs_check_wake' 'taskstats_exit' 'run_timer_softirq' '__ext4_new_inode' 'ep_poll' 'mod_timer' 'blk_mq_dispatch_rq_list' 'vm_area_dup' 'xas_clear_mark' 'copy_process' 'queue_access_lock' 'dd_has_work' 'ext4_free_inode' 'find_next_bit' 'find_get_pages_range_tag' 'tcp_add_backlog' 'ext4_free_inodes_count' 'generic_write_end' 'poll_schedule_timeout' 'do_nanosleep' 'tick_do_update_jiffies64' 'tomoyo_supervisor' 'pipe_poll' 'pid_update_inode' 'echo_char' '__hrtimer_run_queues' 'wbt_done' 'do_exit' 'pipe_wait' 'tick_sched_do_timer' 14:42:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0) [ 84.584801][ T7641] IPVS: ftp: loaded support on port[0] = 21 14:42:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0xfc) openat$pfkey(0xffffffffffffff9c, 0x0, 0x111080, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) fcntl$getown(r3, 0x9) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x111080, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4008ae8a, &(0x7f0000000100)={"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"}) r5 = dup3(r0, r1, 0x0) dup(0xffffffffffffffff) dup2(r5, r2) [ 84.670439][ T7641] chnl_net:caif_netlink_parms(): no params data found [ 84.736025][ T7641] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.758953][ T7641] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.766862][ T7641] device bridge_slave_0 entered promiscuous mode [ 84.789898][ T7641] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.819259][ T7641] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.827364][ T7641] device bridge_slave_1 entered promiscuous mode 14:42:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x400c004) [ 84.845995][ T7641] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.858263][ T7641] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.861043][ T7644] IPVS: ftp: loaded support on port[0] = 21 [ 84.879531][ T7641] team0: Port device team_slave_0 added [ 84.886460][ T7641] team0: Port device team_slave_1 added [ 84.940927][ T7641] device hsr_slave_0 entered promiscuous mode [ 84.999173][ T7641] device hsr_slave_1 entered promiscuous mode [ 85.082047][ T7646] IPVS: ftp: loaded support on port[0] = 21 [ 85.195931][ T7641] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.203147][ T7641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.210582][ T7641] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.217719][ T7641] bridge0: port 1(bridge_slave_0) entered forwarding state 14:42:25 executing program 3: socket$inet_sctp(0x2, 0xb, 0x84) creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x69, 0x0, {0x0, 0x0, 0xffffffffffffffff}}, 0x14) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000000c0)={0x9, 0x7, 0x1}, 0x9) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009e40)=[{{&(0x7f0000000740)=@sco, 0x80, &(0x7f0000003b80)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/174, 0xae}, {&(0x7f0000001880)=""/115, 0x73}, {&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000002900)=""/4096, 0x1000}, {&(0x7f0000003900)=""/142, 0x8e}, {&(0x7f00000039c0)=""/114, 0x72}, {&(0x7f0000003a40)=""/41, 0x29}, {&(0x7f0000003a80)=""/242, 0xf2}], 0x9, &(0x7f0000003c40)=""/4096, 0x1000}, 0xee}, {{&(0x7f0000004c40)=@tipc=@name, 0x80, &(0x7f0000005d80)=[{&(0x7f0000004cc0)=""/31, 0x1f}, {&(0x7f0000004d00)=""/85, 0x55}, {&(0x7f0000004d80)=""/4096, 0x1000}], 0x3, &(0x7f0000005dc0)=""/4096, 0x1000}}, {{&(0x7f0000006dc0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000007140)=[{&(0x7f0000006e40)=""/109, 0x6d}, {&(0x7f0000006ec0)=""/168, 0xa8}, {&(0x7f0000006f80)=""/207, 0xcf}, {&(0x7f0000007080)=""/53, 0x35}, {&(0x7f00000070c0)=""/83, 0x53}], 0x5, &(0x7f00000071c0)=""/196, 0xc4}, 0x7}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000008580)=[{&(0x7f0000007340)=""/142, 0x8e}, {&(0x7f0000007400)=""/4096, 0x1000}, {&(0x7f0000008400)=""/106, 0x6a}, {&(0x7f0000008480)=""/241, 0xf1}], 0x4, &(0x7f00000085c0)=""/14, 0xe}, 0xd0}, {{&(0x7f0000008600)=@xdp, 0x80, &(0x7f00000088c0)=[{&(0x7f0000008680)=""/106, 0x6a}, {&(0x7f0000008700)=""/61, 0x3d}, {&(0x7f0000008740)=""/90, 0x5a}, {&(0x7f00000087c0)=""/3, 0x3}, {&(0x7f0000008800)=""/132, 0x84}], 0x5, &(0x7f0000008940)=""/222, 0xde}, 0x6000000}, {{&(0x7f0000008a40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000009b00)=[{&(0x7f0000008ac0)}, {&(0x7f0000008b00)=""/4096, 0x1000}], 0x2, &(0x7f0000009b40)=""/118, 0x76}, 0x101}, {{&(0x7f0000009bc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000009d40)=[{&(0x7f0000009c40)=""/246, 0xf6}], 0x1, &(0x7f0000009d80)=""/141, 0x8d}, 0x6}], 0x7, 0x20000000, &(0x7f000000a000)={0x77359400}) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f000000a180)={@pppoe={0x18, 0x0, {0x2, @local, 'gre0\x00'}}, {&(0x7f000000a040)=""/229, 0xe5}, &(0x7f000000a140), 0x40}, 0xa0) write$9p(r1, &(0x7f0000000000)="0600000000000000c9b90003050200002a1ff7adf576f3790f68bc2c197cbf8d63735a09ab8383afd2de1a5587fe067fde18fa64249e1dabdd9514480a16f3733d18f833b3aacfcf04f7b0bdd78687423a6bff51b9f9218a249e3d00000000000000", 0x62) mknodat(r1, &(0x7f0000000140)='./bus\x00', 0x200, 0x1f) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020700090200000000000000007a5b00"], 0x10}}, 0x0) [ 85.331403][ T7644] chnl_net:caif_netlink_parms(): no params data found [ 85.485253][ T7641] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.580741][ T7644] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.587874][ T7644] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.609700][ T7644] device bridge_slave_0 entered promiscuous mode [ 85.631845][ T7644] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.659073][ T7644] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.667472][ T7644] device bridge_slave_1 entered promiscuous mode [ 85.718173][ T7646] chnl_net:caif_netlink_parms(): no params data found [ 85.741263][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.759512][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.790112][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 85.826700][ T7641] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.840568][ T7675] IPVS: ftp: loaded support on port[0] = 21 [ 85.855849][ T7644] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.893029][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.919789][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.942475][ T7644] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.030624][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 86.059371][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.084570][ T7672] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.091795][ T7672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.148800][ T7644] team0: Port device team_slave_0 added [ 86.171826][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.201052][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.220718][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.227786][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.269561][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.301475][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.329962][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.361111][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.389918][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.409675][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.445115][ T7644] team0: Port device team_slave_1 added [ 86.465914][ T7646] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.480655][ T7646] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.491287][ T7646] device bridge_slave_0 entered promiscuous mode [ 86.524995][ T7641] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 86.535967][ T7641] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.550090][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.560918][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 14:42:26 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x400320b20c921f56, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 86.569404][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 86.578148][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 86.588344][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 86.620618][ T7646] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.627866][ T7646] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.649571][ T7646] device bridge_slave_1 entered promiscuous mode [ 86.664220][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 86.711178][ T7644] device hsr_slave_0 entered promiscuous mode [ 86.749178][ T7644] device hsr_slave_1 entered promiscuous mode [ 86.790994][ T7644] debugfs: Directory 'hsr0' with parent '/' already present! [ 86.804543][ T7646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.822524][ T7646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.842725][ T7687] IPVS: ftp: loaded support on port[0] = 21 [ 86.858960][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 86.866496][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 14:42:26 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x1bb) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r2}, 0xc) [ 86.901351][ T7641] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.954743][ T7675] chnl_net:caif_netlink_parms(): no params data found [ 86.965567][ T7646] team0: Port device team_slave_0 added [ 86.997595][ T7646] team0: Port device team_slave_1 added [ 87.111724][ T7646] device hsr_slave_0 entered promiscuous mode [ 87.179258][ T7646] device hsr_slave_1 entered promiscuous mode [ 87.218945][ T7646] debugfs: Directory 'hsr0' with parent '/' already present! [ 87.242929][ T7712] IPVS: ftp: loaded support on port[0] = 21 [ 87.417526][ T7644] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.480944][ T7675] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.488314][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.527036][ T7675] device bridge_slave_0 entered promiscuous mode [ 87.586574][ T7644] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.687251][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.709361][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.774400][ T7687] chnl_net:caif_netlink_parms(): no params data found [ 87.814088][ T7675] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.830329][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.875105][ T7675] device bridge_slave_1 entered promiscuous mode [ 87.959714][ T7675] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.149201][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.158057][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 14:42:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0) [ 88.269334][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.276449][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.364763][ T7675] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.441253][ T7646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.482705][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.498471][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.550444][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.598524][ T7672] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.605643][ T7672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.675263][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.723853][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.799844][ T7675] team0: Port device team_slave_0 added [ 88.857633][ T7644] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 88.911311][ T7644] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 14:42:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0) [ 88.964817][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.999446][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.051990][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.113140][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.164343][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.207987][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 14:42:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0) [ 89.249952][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.269211][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.302213][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.339373][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.349705][ T7675] team0: Port device team_slave_1 added [ 89.356469][ T7646] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.398750][ T7644] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.422045][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.436504][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.469993][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 89.487443][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 89.525751][ T7687] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.535642][ T7687] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.552547][ T7687] device bridge_slave_0 entered promiscuous mode [ 89.589234][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.598346][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.622166][ T7672] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.629308][ T7672] bridge0: port 1(bridge_slave_0) entered forwarding state 14:42:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x62300}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000800c5012, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r2 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r2, &(0x7f0000000040), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000080), 0x1d0) ioctl$int_in(0xffffffffffffffff, 0x800000800c5012, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000180)) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$inet_dccp_buf(r4, 0x21, 0x2, &(0x7f0000000640)=""/86, &(0x7f00000006c0)=0x56) [ 89.656493][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.686294][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.720045][ T7672] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.727595][ T7672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.751180][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.763824][ T7672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.774867][ T7712] chnl_net:caif_netlink_parms(): no params data found [ 89.789831][ T7687] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.802683][ T7687] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.811266][ T7687] device bridge_slave_1 entered promiscuous mode [ 89.836380][ T7687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.847566][ C0] hrtimer: interrupt took 28722 ns [ 89.849164][ T2415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.874058][ T7687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.896645][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.906483][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.961224][ T7675] device hsr_slave_0 entered promiscuous mode [ 89.999316][ T7675] device hsr_slave_1 entered promiscuous mode [ 90.058969][ T7675] debugfs: Directory 'hsr0' with parent '/' already present! [ 90.076510][ T7687] team0: Port device team_slave_0 added [ 90.097845][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.107658][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.116662][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.126451][ T7687] team0: Port device team_slave_1 added 14:42:30 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x62300}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000800c5012, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r2 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r2, &(0x7f0000000040), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000080), 0x1d0) ioctl$int_in(0xffffffffffffffff, 0x800000800c5012, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000180)) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$inet_dccp_buf(r4, 0x21, 0x2, &(0x7f0000000640)=""/86, &(0x7f00000006c0)=0x56) [ 90.150406][ T7712] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.158381][ T7712] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.166481][ T7712] device bridge_slave_0 entered promiscuous mode [ 90.175074][ T7712] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.185698][ T7712] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.194398][ T7712] device bridge_slave_1 entered promiscuous mode [ 90.231557][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.242831][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.256371][ T7646] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 90.293795][ T7646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.317692][ T7793] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 90.374752][ T7687] device hsr_slave_0 entered promiscuous mode [ 90.419180][ T7687] device hsr_slave_1 entered promiscuous mode [ 90.451541][ T7687] debugfs: Directory 'hsr0' with parent '/' already present! [ 90.508304][ T2415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.537059][ T2415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 14:42:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0xfc) openat$pfkey(0xffffffffffffff9c, 0x0, 0x111080, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) fcntl$getown(r3, 0x9) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x111080, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4008ae8a, &(0x7f0000000100)={"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"}) r5 = dup3(r0, r1, 0x0) dup(0xffffffffffffffff) dup2(r5, r2) [ 90.661100][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.672668][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.755319][ T7712] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:42:30 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x62300}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000800c5012, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r2 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r2, &(0x7f0000000040), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000080), 0x1d0) ioctl$int_in(0xffffffffffffffff, 0x800000800c5012, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000180)) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$inet_dccp_buf(r4, 0x21, 0x2, &(0x7f0000000640)=""/86, &(0x7f00000006c0)=0x56) [ 90.810377][ T7712] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.887124][ T7646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.000100][ T7712] team0: Port device team_slave_0 added [ 91.006993][ T7712] team0: Port device team_slave_1 added [ 91.067690][ T7843] ================================================================== [ 91.076062][ T7843] BUG: KCSAN: data-race in common_perm_cond / task_dump_owner [ 91.083701][ T7843] [ 91.086652][ T7843] read to 0xffff88812565d82c of 4 bytes by task 7836 on cpu 1: [ 91.095073][ T7843] common_perm_cond+0x65/0x110 [ 91.100142][ T7843] apparmor_inode_getattr+0x2b/0x40 [ 91.105553][ T7843] security_inode_getattr+0x9b/0xd0 [ 91.112583][ T7843] vfs_getattr+0x2e/0x70 [ 91.116972][ T7843] vfs_statx+0x102/0x190 [ 91.121633][ T7843] __do_sys_newstat+0x51/0xb0 [ 91.126394][ T7843] __x64_sys_newstat+0x3a/0x50 [ 91.131271][ T7843] do_syscall_64+0xcc/0x370 [ 91.135928][ T7843] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 91.142263][ T7843] [ 91.144606][ T7843] write to 0xffff88812565d82c of 4 bytes by task 7843 on cpu 0: [ 91.152444][ T7843] task_dump_owner+0x237/0x260 [ 91.155278][ T7675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.157333][ T7843] pid_update_inode+0x3c/0x70 [ 91.168776][ T7843] pid_revalidate+0x91/0xd0 [ 91.173473][ T7843] lookup_fast+0x6f2/0x700 [ 91.177905][ T7843] walk_component+0x6d/0xe70 [ 91.182671][ T7843] link_path_walk.part.0+0x5d3/0xa90 [ 91.188085][ T7843] path_openat+0x14f/0x36e0 [ 91.192600][ T7843] do_filp_open+0x11e/0x1b0 [ 91.197368][ T7843] do_sys_open+0x3b3/0x4f0 [ 91.201922][ T7843] __x64_sys_open+0x55/0x70 [ 91.206647][ T7843] do_syscall_64+0xcc/0x370 [ 91.211167][ T7843] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 91.217500][ T7843] [ 91.219832][ T7843] Reported by Kernel Concurrency Sanitizer on: [ 91.226294][ T7843] CPU: 0 PID: 7843 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 91.233596][ T7843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.240315][ T7687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.243653][ T7843] ================================================================== [ 91.243663][ T7843] Kernel panic - not syncing: panic_on_warn set ... [ 91.243688][ T7843] CPU: 0 PID: 7843 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 91.276057][ T7843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.286377][ T7843] Call Trace: [ 91.289730][ T7843] dump_stack+0x11d/0x181 [ 91.294437][ T7843] panic+0x210/0x640 [ 91.298339][ T7843] ? vprintk_func+0x8d/0x140 [ 91.302959][ T7843] kcsan_report.cold+0xc/0xd [ 91.307826][ T7843] kcsan_setup_watchpoint+0x3fe/0x460 [ 91.313216][ T7843] __tsan_unaligned_write4+0xc4/0x100 [ 91.318858][ T7843] task_dump_owner+0x237/0x260 [ 91.323790][ T7843] ? __rcu_read_unlock+0x66/0x3c0 [ 91.328830][ T7843] pid_update_inode+0x3c/0x70 [ 91.333681][ T7843] pid_revalidate+0x91/0xd0 [ 91.338434][ T7843] lookup_fast+0x6f2/0x700 [ 91.343338][ T7843] walk_component+0x6d/0xe70 [ 91.347945][ T7843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 91.354637][ T7843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 91.360885][ T7843] ? security_inode_permission+0xa5/0xc0 [ 91.366531][ T7843] ? inode_permission+0xa0/0x3c0 [ 91.371661][ T7843] link_path_walk.part.0+0x5d3/0xa90 [ 91.376970][ T7843] path_openat+0x14f/0x36e0 [ 91.381503][ T7843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 91.388103][ T7843] ? debug_smp_processor_id+0x4c/0x172 [ 91.393768][ T7843] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 91.400989][ T7843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 91.407241][ T7843] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 91.413166][ T7843] ? __read_once_size+0x41/0xe0 [ 91.418121][ T7843] do_filp_open+0x11e/0x1b0 [ 91.422986][ T7843] ? __alloc_fd+0x2ef/0x3b0 [ 91.427503][ T7843] do_sys_open+0x3b3/0x4f0 [ 91.432256][ T7843] __x64_sys_open+0x55/0x70 [ 91.436769][ T7843] do_syscall_64+0xcc/0x370 [ 91.441558][ T7843] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 91.447781][ T7843] RIP: 0033:0x7fc3f018e120 [ 91.452624][ T7843] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 91.473306][ T7843] RSP: 002b:00007ffd65c2caf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 91.482158][ T7843] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fc3f018e120 [ 91.490722][ T7843] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fc3f065cd00 [ 91.498813][ T7843] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007fc3f045657b [ 91.507102][ T7843] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3f065bd00 [ 91.515741][ T7843] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 91.526368][ T7843] Kernel Offset: disabled [ 91.530709][ T7843] Rebooting in 86400 seconds..