[info] Using makefile-style concurrent boot in runlevel 2. [ 42.629192][ T25] audit: type=1800 audit(1574321367.255:21): pid=7516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.672927][ T25] audit: type=1800 audit(1574321367.255:22): pid=7516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.170' (ECDSA) to the list of known hosts. 2019/11/21 07:29:39 fuzzer started 2019/11/21 07:29:41 dialing manager at 10.128.0.105:37585 2019/11/21 07:29:41 syscalls: 2566 2019/11/21 07:29:41 code coverage: enabled 2019/11/21 07:29:41 comparison tracing: enabled 2019/11/21 07:29:41 extra coverage: extra coverage is not supported by the kernel 2019/11/21 07:29:41 setuid sandbox: enabled 2019/11/21 07:29:41 namespace sandbox: enabled 2019/11/21 07:29:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/21 07:29:41 fault injection: enabled 2019/11/21 07:29:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/21 07:29:41 net packet injection: enabled 2019/11/21 07:29:41 net device setup: enabled 2019/11/21 07:29:41 concurrency sanitizer: enabled 2019/11/21 07:29:41 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 67.505429][ T7680] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/21 07:29:54 adding functions to KCSAN blacklist: '__ext4_new_inode' 'ext4_free_inode' 'ext4_free_inodes_count' 'lruvec_lru_size' 'ep_poll' 'mm_update_next_owner' 'alloc_pid' 'find_get_pages_range_tag' 'find_next_bit' 'taskstats_exit' 'blk_stat_add' 'tick_nohz_idle_stop_tick' '__dev_queue_xmit' 'futex_wait_queue_me' 'p9_poll_workfn' 'pipe_wait' 'wbt_issue' 'do_nanosleep' 'padata_find_next' 'xas_find_marked' 'echo_char' 'process_srcu' 'audit_log_start' 'rcu_gp_fqs_loop' 'generic_fillattr' 'writeback_sb_inodes' 'copy_process' 'rcu_gp_fqs_check_wake' 'blk_mq_sched_dispatch_requests' 'do_exit' '__rb_rotate_set_parents' 'ext4_mb_find_by_goal' 'blk_mq_dispatch_rq_list' 'tick_sched_do_timer' 'pcpu_alloc' 'evict' 'n_tty_receive_buf_common' '__snd_rawmidi_transmit_ack' 'atime_needs_update' 'run_timer_softirq' 'ext4_mb_good_group' 'smpboot_thread_fn' 'tomoyo_supervisor' 'sctp_assoc_migrate' 'blk_mq_get_request' 'ext4_mark_iloc_dirty' '__skb_try_recv_from_queue' 'ext4_da_write_end' 'tcp_add_backlog' 'mod_timer' 'dput' 'balance_dirty_pages' 'find_alive_thread' 'yama_ptracer_del' '__hrtimer_run_queues' 'ext4_has_free_clusters' 'generic_write_end' 'wbt_done' '__delete_from_page_cache' 'do_syslog' 'generic_permission' 'dd_has_work' 'tick_do_update_jiffies64' 'kauditd_thread' 'ktime_get_real_seconds' 'vm_area_dup' '__get_user_pages' 'poll_schedule_timeout' 'sit_tunnel_xmit' 'add_timer' 'xas_clear_mark' 'pipe_poll' 'ext4_nonda_switch' 'timer_clear_idle' 'blk_mq_run_hw_queue' 'page_counter_try_charge' 'list_lru_count_one' 'pid_update_inode' 'mem_cgroup_select_victim_node' 'bio_endio' 'snd_seq_check_queue' 07:33:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xa, 0x4000000000000800, 0x1}, 0x1d) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f00000012c0), &(0x7f00000001c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001200)={r0, &(0x7f0000000000)="a0", &(0x7f0000000040)=""/166}, 0x20) 07:33:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000004c0)="f21d83", 0x3) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 308.699789][ T7684] IPVS: ftp: loaded support on port[0] = 21 [ 308.799977][ T7684] chnl_net:caif_netlink_parms(): no params data found [ 308.845108][ T7684] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.852348][ T7684] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.860429][ T7684] device bridge_slave_0 entered promiscuous mode [ 308.868237][ T7684] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.875844][ T7684] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.883465][ T7684] device bridge_slave_1 entered promiscuous mode [ 308.904539][ T7684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 308.915368][ T7684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 308.934957][ T7684] team0: Port device team_slave_0 added [ 308.941926][ T7684] team0: Port device team_slave_1 added [ 308.946590][ T7687] IPVS: ftp: loaded support on port[0] = 21 07:33:53 executing program 2: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00004d2000/0x4000)=nil, 0x2) [ 309.036521][ T7684] device hsr_slave_0 entered promiscuous mode [ 309.104972][ T7684] device hsr_slave_1 entered promiscuous mode 07:33:53 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x10, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 309.182503][ T7690] IPVS: ftp: loaded support on port[0] = 21 [ 309.293943][ T7684] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.301060][ T7684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.308416][ T7684] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.316455][ T7684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.555467][ T7687] chnl_net:caif_netlink_parms(): no params data found [ 309.578736][ T7684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.650463][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.670498][ T3017] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.706456][ T3017] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.745653][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 309.779056][ T7684] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.822694][ T7716] IPVS: ftp: loaded support on port[0] = 21 [ 309.831183][ T7687] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.849100][ T7687] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.875149][ T7687] device bridge_slave_0 entered promiscuous mode [ 309.945467][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 309.966118][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.985698][ T3017] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.992953][ T3017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.044656][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 310.056063][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.084668][ T3017] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.091766][ T3017] bridge0: port 2(bridge_slave_1) entered forwarding state 07:33:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) socket(0x10, 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000300)=@proc, 0xf0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0xfffffffffffffd1d) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0x12}}, 0x14) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x70bd2c, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x9}}, ["", "", "", "", "", ""]}, 0x24}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4000) tkill(r1, 0x9) r3 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r3, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x8) pipe2(&(0x7f0000000200), 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x7f) sendto$inet(r3, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r3, &(0x7f0000006c80), 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) [ 310.137582][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 310.165963][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 310.205849][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 310.235225][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 310.265167][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 310.305040][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 310.335747][ T7687] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.342853][ T7687] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.394871][ T7687] device bridge_slave_1 entered promiscuous mode [ 310.426785][ T7690] chnl_net:caif_netlink_parms(): no params data found [ 310.452248][ T7718] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 310.465080][ T7718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 310.504644][ T7718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.524561][ T7718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 310.555671][ T7718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.594286][ T7684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 310.631430][ T7721] IPVS: ftp: loaded support on port[0] = 21 [ 310.656962][ T7687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.694859][ T7684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 310.717189][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 310.725840][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 310.740925][ T7687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.788283][ T7690] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.796009][ T7690] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.803828][ T7690] device bridge_slave_0 entered promiscuous mode 07:33:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000004c0)="f21d83", 0x3) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 310.837505][ T7687] team0: Port device team_slave_0 added [ 310.844601][ T7690] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.851782][ T7690] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.860267][ T7690] device bridge_slave_1 entered promiscuous mode [ 310.882609][ T7687] team0: Port device team_slave_1 added [ 310.899468][ T7690] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.915764][ T7716] chnl_net:caif_netlink_parms(): no params data found [ 310.932087][ T7690] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.026296][ T7687] device hsr_slave_0 entered promiscuous mode [ 311.066097][ T7687] device hsr_slave_1 entered promiscuous mode [ 311.126096][ T7687] debugfs: Directory 'hsr0' with parent '/' already present! [ 311.135201][ T7690] team0: Port device team_slave_0 added [ 311.160636][ T7716] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.172270][ T7739] IPVS: ftp: loaded support on port[0] = 21 [ 311.178339][ T7716] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.190153][ T7716] device bridge_slave_0 entered promiscuous mode [ 311.207019][ T7690] team0: Port device team_slave_1 added [ 311.271421][ T7716] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.294068][ T7716] bridge0: port 2(bridge_slave_1) entered disabled state 07:33:55 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x400806e, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f0000000240)="f11d9485945532b02c13b63ecca90bcd5e45aae6c27dcfb60d8f3b82d09721", 0x1f, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) [ 311.316617][ T7716] device bridge_slave_1 entered promiscuous mode [ 311.387877][ T7716] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 311.418522][ T7764] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 311.465829][ T7716] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.558824][ T7690] device hsr_slave_0 entered promiscuous mode 07:33:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x400806e, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f0000000240)="f11d9485945532b02c13b63ecca90bcd5e45aae6c27dcfb60d8f3b82d09721", 0x1f, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) [ 311.626523][ T7690] device hsr_slave_1 entered promiscuous mode [ 311.666683][ T7690] debugfs: Directory 'hsr0' with parent '/' already present! [ 311.789913][ T7721] chnl_net:caif_netlink_parms(): no params data found [ 311.819915][ T7716] team0: Port device team_slave_0 added [ 311.842658][ T7687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 311.884284][ T7716] team0: Port device team_slave_1 added [ 311.919477][ T7739] chnl_net:caif_netlink_parms(): no params data found [ 311.963837][ T7687] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.079633][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 07:33:56 executing program 0: [ 312.123591][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 312.255874][ T7716] device hsr_slave_0 entered promiscuous mode [ 312.294533][ T7716] device hsr_slave_1 entered promiscuous mode [ 312.334205][ T7716] debugfs: Directory 'hsr0' with parent '/' already present! [ 312.341842][ T7721] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.364160][ T7721] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.372030][ T7721] device bridge_slave_0 entered promiscuous mode 07:33:57 executing program 0: [ 312.435783][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 312.445684][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.504365][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.511455][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.607522][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 312.668164][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 312.697961][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.705113][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state 07:33:57 executing program 0: [ 312.804697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 312.855183][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 312.964449][ T7721] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.971551][ T7721] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.014843][ T7721] device bridge_slave_1 entered promiscuous mode 07:33:57 executing program 0: [ 313.094465][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.154848][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 313.184931][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 313.265141][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 313.273785][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 313.385024][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 07:33:58 executing program 0: [ 313.434705][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.527131][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 313.605005][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.613413][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 313.708841][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 313.759090][ T7690] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.830565][ T7721] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.911529][ T7739] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.924227][ T7739] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.932073][ T7739] device bridge_slave_0 entered promiscuous mode [ 314.029906][ T7690] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.068623][ T7687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.119015][ T7721] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.152976][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 314.168492][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.227822][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.267539][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 314.314477][ T7739] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.321553][ T7739] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.378184][ T7739] device bridge_slave_1 entered promiscuous mode [ 314.463147][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.491687][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.544410][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.552461][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.624770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.655317][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.706339][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.713415][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.775243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 314.835035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 314.864763][ T7716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.897571][ T7721] team0: Port device team_slave_0 added [ 314.904616][ T7690] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 314.954226][ T7690] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 315.008653][ T7739] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.039996][ T7716] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.055865][ T7721] team0: Port device team_slave_1 added [ 315.067023][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.098840][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 315.125051][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 315.149815][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 315.155215][ T7853] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 315.174810][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 315.183657][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 315.204724][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 315.213213][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 315.264907][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.284658][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 315.324850][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 315.343373][ T7690] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 315.365837][ T7739] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.424693][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 315.449442][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 315.475341][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 315.482904][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 315.534498][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 315.554600][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 315.577891][ T3017] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.584998][ T3017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.666560][ T7721] device hsr_slave_0 entered promiscuous mode [ 315.704496][ T7721] device hsr_slave_1 entered promiscuous mode [ 315.747555][ T7721] debugfs: Directory 'hsr0' with parent '/' already present! [ 315.755625][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.763537][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 07:34:00 executing program 0: [ 315.793024][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 315.811516][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.818618][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.839040][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 315.847964][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 315.857611][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 315.869403][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 315.967681][ T7739] team0: Port device team_slave_0 added [ 315.973682][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 316.009592][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 316.054777][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 316.105208][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 316.124605][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.147411][ T7716] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 316.177598][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 316.205266][ T7739] team0: Port device team_slave_1 added [ 316.245095][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 316.253829][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.316081][ T7716] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 316.398520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 316.406698][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:34:01 executing program 2: [ 316.466327][ T7739] device hsr_slave_0 entered promiscuous mode [ 316.524471][ T7739] device hsr_slave_1 entered promiscuous mode [ 316.564199][ T7739] debugfs: Directory 'hsr0' with parent '/' already present! [ 316.647889][ T7721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 316.733424][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.772350][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.810316][ T7721] 8021q: adding VLAN 0 to HW filter on device team0 [ 316.867328][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 316.878990][ T7919] ================================================================== [ 316.887218][ T7919] BUG: KCSAN: data-race in common_perm_cond / task_dump_owner [ 316.894683][ T7919] [ 316.894948][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.897112][ T7919] read to 0xffff88812526bd6c of 4 bytes by task 7917 on cpu 0: [ 316.912813][ T7919] common_perm_cond+0x65/0x110 [ 316.917581][ T7919] apparmor_inode_getattr+0x2b/0x40 [ 316.922803][ T7919] security_inode_getattr+0x9b/0xd0 [ 316.927997][ T7919] vfs_getattr+0x2e/0x70 [ 316.932247][ T7919] vfs_statx+0x102/0x190 [ 316.937365][ T7919] __do_sys_newstat+0x51/0xb0 [ 316.942051][ T7919] __x64_sys_newstat+0x3a/0x50 [ 316.946842][ T7919] do_syscall_64+0xcc/0x370 [ 316.951353][ T7919] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.954532][ T3017] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.957249][ T7919] [ 316.957263][ T7919] write to 0xffff88812526bd6c of 4 bytes by task 7919 on cpu 1: [ 316.957289][ T7919] task_dump_owner+0x237/0x260 [ 316.964491][ T3017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.966824][ T7919] pid_update_inode+0x3c/0x70 [ 316.991053][ T7919] pid_revalidate+0x91/0xd0 [ 316.995803][ T7919] lookup_fast+0x6f2/0x700 [ 317.000324][ T7919] walk_component+0x6d/0xe70 [ 317.004912][ T7919] link_path_walk.part.0+0x5d3/0xa90 [ 317.010210][ T7919] path_openat+0x14f/0x36e0 [ 317.014712][ T7919] do_filp_open+0x11e/0x1b0 [ 317.019212][ T7919] do_sys_open+0x3b3/0x4f0 [ 317.023643][ T7919] __x64_sys_open+0x55/0x70 [ 317.028160][ T7919] do_syscall_64+0xcc/0x370 [ 317.032816][ T7919] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.038723][ T7919] [ 317.041047][ T7919] Reported by Kernel Concurrency Sanitizer on: [ 317.044737][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 317.047366][ T7919] CPU: 1 PID: 7919 Comm: ps Not tainted 5.4.0-rc7+ #0 [ 317.061481][ T7919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.071621][ T7919] ================================================================== [ 317.074671][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.080767][ T7919] Kernel panic - not syncing: panic_on_warn set ... [ 317.095600][ T7919] CPU: 1 PID: 7919 Comm: ps Not tainted 5.4.0-rc7+ #0 [ 317.102360][ T7919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.112501][ T7919] Call Trace: [ 317.115908][ T7919] dump_stack+0x11d/0x181 [ 317.120614][ T7919] panic+0x210/0x640 [ 317.124526][ T7919] ? vprintk_func+0x8d/0x140 [ 317.129348][ T7919] kcsan_report.cold+0xc/0xd [ 317.134061][ T7919] kcsan_setup_watchpoint+0x3fe/0x460 [ 317.134770][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.139468][ T7919] __tsan_unaligned_write4+0xc4/0x100 [ 317.152894][ T7919] task_dump_owner+0x237/0x260 [ 317.157661][ T7919] ? __rcu_read_unlock+0x66/0x3c0 [ 317.162692][ T7919] pid_update_inode+0x3c/0x70 [ 317.167463][ T7919] pid_revalidate+0x91/0xd0 [ 317.171970][ T7919] lookup_fast+0x6f2/0x700 [ 317.176495][ T7919] walk_component+0x6d/0xe70 [ 317.181094][ T7919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.187546][ T7919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.193797][ T7919] ? security_inode_permission+0xa5/0xc0 [ 317.194521][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.199625][ T7919] ? inode_permission+0xa0/0x3c0 [ 317.206706][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.211567][ T7919] link_path_walk.part.0+0x5d3/0xa90 [ 317.211593][ T7919] path_openat+0x14f/0x36e0 [ 317.211622][ T7919] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 317.234437][ T7919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.240686][ T7919] ? __rcu_read_unlock+0x66/0x3c0 [ 317.245718][ T7919] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 317.251613][ T7919] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 317.257516][ T7919] ? __read_once_size+0x41/0xe0 [ 317.262379][ T7919] do_filp_open+0x11e/0x1b0 [ 317.266903][ T7919] ? __alloc_fd+0x2ef/0x3b0 [ 317.271446][ T7919] do_sys_open+0x3b3/0x4f0 [ 317.275894][ T7919] __x64_sys_open+0x55/0x70 [ 317.280405][ T7919] do_syscall_64+0xcc/0x370 [ 317.284635][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 317.284921][ T7919] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.298684][ T7919] RIP: 0033:0x7f0dec58f120 [ 317.303106][ T7919] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 317.322706][ T7919] RSP: 002b:00007ffd89da8368 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 317.325052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 317.331122][ T7919] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f0dec58f120 [ 317.347088][ T7919] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f0deca5dd00 [ 317.355080][ T7919] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f0dec857a10 [ 317.363054][ T7919] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0deca5cd00 [ 317.371021][ T7919] R13: 000000000230a1c0 R14: 0000000000000005 R15: 0000000000000000 [ 317.380766][ T7919] Kernel Offset: disabled [ 317.385177][ T7919] Rebooting in 86400 seconds..