Warning: Permanently added '10.128.0.135' (ECDSA) to the list of known hosts. 2019/11/23 07:40:50 fuzzer started 2019/11/23 07:40:51 dialing manager at 10.128.0.105:37257 2019/11/23 07:40:52 syscalls: 2566 2019/11/23 07:40:52 code coverage: enabled 2019/11/23 07:40:52 comparison tracing: enabled 2019/11/23 07:40:52 extra coverage: extra coverage is not supported by the kernel 2019/11/23 07:40:52 setuid sandbox: enabled 2019/11/23 07:40:52 namespace sandbox: enabled 2019/11/23 07:40:52 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/23 07:40:52 fault injection: enabled 2019/11/23 07:40:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/23 07:40:52 net packet injection: enabled 2019/11/23 07:40:52 net device setup: enabled 2019/11/23 07:40:52 concurrency sanitizer: enabled 2019/11/23 07:40:52 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 67.190192][ T7657] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/23 07:41:09 adding functions to KCSAN blacklist: 'rcu_gp_fqs_check_wake' 'taskstats_exit' 'tick_sched_do_timer' 'inet_sk_diag_fill' 'pipe_poll' 'page_counter_try_charge' 'relay_switch_subbuf' 'blk_mq_run_hw_queue' 'complete_signal' 'lruvec_lru_size' 'flush_workqueue' '__snd_rawmidi_transmit_ack' 'inactive_list_is_low' 'ksys_read' '__dev_queue_xmit' 'timer_clear_idle' 'list_lru_count_one' '__skb_try_recv_from_queue' 'handle_userfault' '__filemap_fdatawrite_range' 'xas_find_marked' '__delete_from_page_cache' 'futex_wait_queue_me' '__add_to_page_cache_locked' 'iput' '__writeback_single_inode' 'ep_poll' 'ext4_free_inodes_count' 'atime_needs_update' 'ktime_get_seconds' 'run_timer_softirq' 'ext4_free_inode' 'virtqueue_enable_cb_delayed' 'snd_seq_check_queue' 'common_perm_cond' 'dd_has_work' 'mem_cgroup_select_victim_node' 'fib6_clean_node' 'kauditd_thread' 'add_timer' 'tick_nohz_idle_stop_tick' 'rcu_gp_fqs_loop' 'virtqueue_disable_cb' 'generic_fillattr' 'pcpu_alloc' 'sbitmap_queue_clear' 'shmem_getpage_gfp' 'ext4_mb_good_group' 'percpu_counter_add_batch' 'snd_ctl_notify' 'do_exit' 'wbt_wait' 'generic_permission' 'n_tty_receive_buf_common' 'wbt_done' '__mark_inode_dirty' 'tick_nohz_next_event' '__hrtimer_run_queues' '__splice_from_pipe' 'ext4_nonda_switch' 'audit_log_start' 'wbc_attach_and_unlock_inode' 'ext4_mb_find_by_goal' 'cma_comp_exch' 'do_syslog' 'blk_mq_get_request' 'blk_mq_dispatch_rq_list' 'sit_tunnel_xmit' 'ip_finish_output2' 'enqueue_timer' 'yama_ptracer_del' 'unix_release_sock' 'poll_schedule_timeout' 'pid_update_inode' '__ext4_new_inode' 'evict' 'tick_do_update_jiffies64' 'ext4_mark_iloc_dirty' 'p9_poll_workfn' 'ns_capable_common' 'netlink_getname' 'find_next_bit' 'generic_write_end' 'shmem_file_read_iter' '__process_echoes' 'd_instantiate_new' 'ext4_da_write_end' 'ondemand_readahead' 'snd_seq_prioq_cell_out' 'tcp_add_backlog' 'xas_clear_mark' 'copy_process' 'process_srcu' 'vm_area_dup' 'tomoyo_supervisor' 'ktime_get_real_seconds' 'find_get_pages_range_tag' 'pipe_wait' 'wbt_issue' 'ip6_dst_gc' 'ext4_has_free_clusters' 'do_nanosleep' 'hrtimer_wakeup' 'ext4_writepages' 'ext4_xattr_get' 'echo_char' 'generic_file_read_iter' 'blk_mq_sched_dispatch_requests' 'wbc_detach_inode' 07:45:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000001e00000300000000200000000000000000000000000000feffffff0000000000000000000000000012c31a00b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000fffbff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d00a7ce006c6f0000000800000000e8ffffff909c76e500000000000000000000100001010000e1c90fed90ac00000000a85f001a4b00e2ffffff000005000000aaaeaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000004000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) 07:45:32 executing program 1: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x40000001, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) [ 336.572892][ T7661] IPVS: ftp: loaded support on port[0] = 21 [ 336.662585][ T7661] chnl_net:caif_netlink_parms(): no params data found [ 336.720334][ T7661] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.727742][ T7661] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.736017][ T7661] device bridge_slave_0 entered promiscuous mode [ 336.745023][ T7661] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.752428][ T7661] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.768512][ T7661] device bridge_slave_1 entered promiscuous mode [ 336.788984][ T7665] IPVS: ftp: loaded support on port[0] = 21 [ 336.803936][ T7661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 336.823791][ T7661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 336.859580][ T7661] team0: Port device team_slave_0 added 07:45:33 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 336.873720][ T7661] team0: Port device team_slave_1 added [ 336.989697][ T7661] device hsr_slave_0 entered promiscuous mode [ 337.027913][ T7661] device hsr_slave_1 entered promiscuous mode 07:45:33 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xdf\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f00000002c0), 0x4) [ 337.169650][ T7669] IPVS: ftp: loaded support on port[0] = 21 [ 337.179189][ T7665] chnl_net:caif_netlink_parms(): no params data found [ 337.254850][ T7661] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.261943][ T7661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.270140][ T7661] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.279056][ T7661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.456757][ T7693] IPVS: ftp: loaded support on port[0] = 21 [ 337.481753][ T7665] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.518014][ T7665] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.558613][ T7665] device bridge_slave_0 entered promiscuous mode [ 337.568426][ T7665] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.578639][ T7665] bridge0: port 2(bridge_slave_1) entered disabled state 07:45:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x12, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c00810ce00f80ecdb4cb9f207c804a00d000000880012fb0a0002000a0ada1b40d805000300c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 337.607639][ T7665] device bridge_slave_1 entered promiscuous mode [ 337.715380][ T7661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.743025][ T3018] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.768560][ T3018] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.809345][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 337.858000][ T7665] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 337.872141][ T7661] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.899447][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.919189][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.944338][ T7665] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 337.990192][ T7669] chnl_net:caif_netlink_parms(): no params data found [ 338.003300][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.019183][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.047907][ T7664] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.055135][ T7664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.088094][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.119287][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.148078][ T7664] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.155148][ T7664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.188261][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 338.219858][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 338.249148][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 338.280016][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 338.345174][ T7700] IPVS: ftp: loaded support on port[0] = 21 [ 338.359874][ T7661] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 338.382472][ T7661] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 07:45:34 executing program 5: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000f00f88)) msgsnd(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="03"], 0x1, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000f00f88)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 338.435323][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 338.444970][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 338.479444][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 338.509390][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 338.539237][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.569115][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 338.599431][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.643345][ T7665] team0: Port device team_slave_0 added [ 338.663496][ T7661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 338.712174][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 338.724603][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 338.751528][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 338.777460][ T7665] team0: Port device team_slave_1 added [ 338.793759][ T7669] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.807245][ T7669] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.819329][ T7669] device bridge_slave_0 entered promiscuous mode [ 338.846810][ T7706] IPVS: ftp: loaded support on port[0] = 21 [ 338.868342][ T7693] chnl_net:caif_netlink_parms(): no params data found [ 338.878715][ T7669] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.886210][ T7669] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.894039][ T7669] device bridge_slave_1 entered promiscuous mode [ 338.949709][ T7665] device hsr_slave_0 entered promiscuous mode [ 338.997842][ T7665] device hsr_slave_1 entered promiscuous mode [ 339.047821][ T7665] debugfs: Directory 'hsr0' with parent '/' already present! [ 339.134742][ T7669] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 339.248652][ T7669] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 339.299561][ T7693] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.306979][ T7693] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.319679][ T7693] device bridge_slave_0 entered promiscuous mode 07:45:35 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0xffffffffffffff43, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x81022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x5}, 0x200020000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) pipe2(0x0, 0x100800) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) getpid() ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x3) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x80) [ 339.353718][ T7693] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.361496][ T7693] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.377031][ T7693] device bridge_slave_1 entered promiscuous mode [ 339.398382][ T7669] team0: Port device team_slave_0 added [ 339.438821][ T7700] chnl_net:caif_netlink_parms(): no params data found [ 339.465586][ T7669] team0: Port device team_slave_1 added [ 339.482327][ T7665] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.531533][ T7706] chnl_net:caif_netlink_parms(): no params data found [ 339.542201][ T7693] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 339.593149][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 339.593167][ T26] audit: type=1804 audit(1574495135.770:31): pid=7748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir631412284/syzkaller.q4lHZC/1/bus" dev="sda1" ino=16519 res=1 [ 339.637547][ C0] hrtimer: interrupt took 44899 ns [ 339.646351][ T7669] device hsr_slave_0 entered promiscuous mode [ 339.688836][ T7669] device hsr_slave_1 entered promiscuous mode [ 339.720354][ T7669] debugfs: Directory 'hsr0' with parent '/' already present! [ 339.746270][ T7696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 339.770322][ T26] audit: type=1800 audit(1574495135.840:32): pid=7748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16519 res=0 07:45:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0xffffffffffffff43, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x81022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x5}, 0x200020000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) pipe2(0x0, 0x100800) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) getpid() ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x3) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x80) [ 339.808217][ T7696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 339.817652][ T7665] 8021q: adding VLAN 0 to HW filter on device team0 [ 339.828646][ T7693] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 339.900162][ T7700] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.907314][ T7700] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.961891][ T7700] device bridge_slave_0 entered promiscuous mode 07:45:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0xffffffffffffff43, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x81022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x5}, 0x200020000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) pipe2(0x0, 0x100800) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) getpid() ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x3) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x80) [ 340.112084][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 340.161262][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:45:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0xffffffffffffff43, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x81022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x5}, 0x200020000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) pipe2(0x0, 0x100800) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) getpid() ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x3) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x80) [ 340.238048][ T3018] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.245204][ T3018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.290385][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 340.318094][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.326452][ T3018] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.333530][ T3018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.428093][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 340.436991][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:45:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0xffffffffffffff43, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x81022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x5}, 0x200020000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) pipe2(0x0, 0x100800) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) getpid() ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x3) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x80) [ 340.537847][ T7700] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.545024][ T7700] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.621217][ T7700] device bridge_slave_1 entered promiscuous mode [ 340.667643][ T7706] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.674777][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.725001][ T7706] device bridge_slave_0 entered promiscuous mode [ 340.768273][ T7706] bridge0: port 2(bridge_slave_1) entered blocking state 07:45:37 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) getresuid(&(0x7f0000000080), &(0x7f00000000c0), 0x0) r1 = add_key(0x0, &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='a', 0x1, 0xffffffffffffffff) r2 = add_key(&(0x7f0000000140)='cifs.spnego\x00', 0x0, &(0x7f00000003c0)="5614fe77990cd0b37f3ebcdc6de2771606ff7ab68bc7418494a4325d7c6d5676691a30cb3a964fda775c0f6606ae85aacdc71f4a1ee5414fc985aaa630b2e7bf993f704a11b7a7416b21dad9486a4eed2d9fd98fe1cb307b50d04d3c30af1c42d252dd277fe2f280234e52be383e52c94724a6c3a73c929d62923779265a08caea422828c7a4aa5b489bbff4ba1f76716a8ab8e355da5ab81135d7fcb6163b5e75eadd9a8bea6882c3c80db671b065208c71e9a0f5a47d4a37fed63d80bdd79aaccfdfeb8c52398dbae994082262e930737f9dec08ae182b715898e7325c17eeeab5d66d3a0ba8e665c39c680f21d996f608a83aaf61875c4c3c4fd593e0cb34665ee0df47f728c99ecaccf835d26fc808943c0acd623ea1ede825b5ae9dbe2152bdb3f749709e500e71b6808544eb65b13bf5c73a271a60c534b4b2c53c0a204043695210842f400624a71bc9918284a6e6df8ab08885902365fd56ddf842e8e5a5a6d80d1f60bdb8fdf28b5b6af4d24894ed8455b660d02b392164209a12f348f7f437676b1edd0f8b81ae9ea6c60e62bd5b7085004d740c121e6b04088ab90da67092ddf61daeacf5571086c95fe3cec56897084b8ec9eff26c07cb05723531850bdf3ea7f5463e01c9ae3a67dd9cffd82a8538fd0e429c932a7f095a3e69e4cdd7b3be9b197aac47a2482335426eeb80614128ea99929ab214ff4a65b98313eb2c30beaf39352d7bff4343991dc06df1995ff7d5a0f6dd6756bbeebed0db91cca4b832d868f074b2cdaad59497a6354082fdd7955ac5c14879cf8cd3a947ac6107e70f6e9ff30a27c302b80189c7e69c180dc874c4e145612955103395d998a55d7896803b04cedf426b39540f49e8605b319f4ea4f561ea5b6ff8b1e05ded785f271aa491d72c3aa02813a544dfba6741121da8bbe763ba32b26186655f4dd3086d282c41b896e6ec66d653f6b859e736525d0d716e7efa3187c0a20c3236abece87afacbb21841b0a5451dceba5ad848b21bd04457d8767aef084232c8df2700f129e35956dd5c88e59f7fcca9f39db02c8e18542baf8444585f5f93b758c81bec2c906d5d5ba76886afaf8645f4fc8b21d53cfa703403b97f011b33ca8f4ddd25b231635bdf716f791ed8ef435a2fb8ac674b03d9490d9a0006ed82815b0baebc097f7cc0895eb188f0666aa050559bb74897caeb305afd56e28336ef25c67c6005f03e63ac11595f2880fb9d6dd5af2bdbd52228ecf495f108f87561079b58a4a13d9eb266176ae0b3e4179299e340994e3405560ce1ec65641dc5852324ba52974de8c20c0bd6fb43e30a0c462c5db8f5adbd641e933dc95f183cdb5dffbf4372bdcb296b71858cf1b47554c6242f429edbcbf6eb3aa6d03f581116b14e10af1e3aae54e35a241995ce5094863b9885f176586569fbc78dee2a38da4f642f8d22acc700200694ca21be42627cc0602438ba5a5c4fc7ae348b22e5b7ca00dcc9c9ca833971feb1f3e7dfb733a2b9d21623c173ffef0af179d35d41d31131e3774881c5b021eb55bd35485b6d01bc4dd6a7a31216729e5dfbeea9e97d8b7d855a6682ccf767309e41f0ff44a4e1be267435a5e71bca02cd471df95b8d6a118de20343c597dbba9e6a85a09eaba289992f3afc0360fbe0e6f7b35d2bc4f3a0ca5007ee28107ecfe3a567eee5ab223b3182c75b2e2e233660e72ed9bca3b1a4a5f33931b28c4460fe771e6e62243cb9305f9116b22c14c7e17d3dd21262cd254c4ae62fb2f8308c63b9768438cc7ef3612d58d922110f150d869ffa2e9e678ea8c0b2332fee4c55629de1e4e391c285b68c9b941a46fb518d556c2df0790e69a8da1f036c729dff6df4515add3f8f12b2f79a0e225cafecedba3619a7975ba2aafbf97c18515c78f091f8a0063571c15e71909cac74346543b41cc9ffb4361da9796714006dbedb240dab74efde7a179e5b9761f201fa20af9f5c24c9d3f1bfe4d9a59801c78d3a7beb200c3cb6bc23bef52d071d0ea476baa4580821f9b75046a2afb7bc8dbeac69d75e1dfe7c198e5813e7d1d9596a7c26c6289edd0a729e9b377305bfda3f7c9589672a762a7861cf80c85b599f80da52076f94d06abf945ed29c2fc919447fa795615565ac450dbf9b7feb86bfd91df1c8d73b095bf03845f87b419b2e1ce6105069aa0774cac4469d6e6f984e82891fc1b61dc0409182c9284a66be86b780de7f0ae282b79e3dab47b6eafa58ac44d0ac4c62718e8ea0c2d031486305b6d405838887ae2dd2f4279c7251e2814d2406debc317a5599a04f801e579dcd7ac93065735f2b7c759641e134c1704f356c0faf30902bb9de56e167251a9a64ffac14977f14576c8dc4d5079a1998f0d17eb34f4861e04ee89f9a0676f2b83ffafa33efedb47623b60426ed45c1ce2f2b1ca75781479b89f99fe9bf95b3c9418909bd17c56c42bfc99913d1dd5b2189dd0cc4b382c3b7e03c0644d3c48ef235591e44d7a80d3f72f458c498cfa08fc4fa2a765bf38d19584d0f5dc689a8fb058fbdc259b6bce72b9722bb0c54aa6fbe657dcd3e29264db8186fb880ce20fbddae81013d301941fcfac2e15a3ffd93d24d98fd1b521d444fdcea88927668e32be410fd4631842fef82efcd1baa5359721ac35aa57eb62515bc7ab4d9d0a2402ed6afc1e7c39fc33ddb4f2dea15389d981f081e9d9364d939e51e7160e5a0340e4fa361610a0dd0bbcb904e7b7548764a50ed664bb126abb30e38bfcf84b26af468c210acf04e96511046112ba32367eda53eae50b8ed68ac40607e8d01452f8c0b4f2a52cb702516a197fa812087b5c36239a9193b8f40337fad72b86ade22aec359f8e4bfbf7a7304fafb71dae19d97ab14c39ddfca07f6c23afb73508c2d4e706302d479f10a33e7a522459863016681b583ebf794c65aca33592f121384af3bfb073569a051c61ae7f080db28c07bb7008970d10084019158957e8a0816d751f52e5f70b7c9895d9c85087dfc28bd48d6d8d5823ae01f28c7e8485c458276582b14c44f852befd90218234968f0c3b8f570780584e054bfa4787851d3bf5518fd88297f151b77779165274bdff8e1521f4fadc47b9c5f5b8e6180c3d84d2d1f5670efd25f547ea736d432206634b7186ea1ccdd6ba42ff25fc72f8240f0e2b7d5a322afe469dd438242b24f729465f91bff5be3f72a046d82ff209bbbecb47077d0282d93fbcdf854b50cd202cef42d77a94046a00d62139e01716493209791df04b15155eebefbe92840341ebb586b18bb841c157b03d3d064b8f961a58a703ecd49583a5390f3de05378b339d62bcffae89f920818dcc5ebab40fce5d199afcd8317e1172785a55f1641e1acc1002c85021ed8a0f1799bb620fb07901b77a0b2f8e9169667841e4d43df3cb04e8f426693eeb9c3e435f9283e74444459f44b933a1914781da16a0ffb775e4a60cee1619da46c365f861ff23db902e0bddf150668032f36a1e4f29a90bd41d4b68f079fbefa6f77510f85c10a4d561950b67da56656ca1a8807f204add6820d810ebd5723786891d4ffbb5e227528381e4085a7c0968b3b3f594bbfe756911063ca2d7c2824fd9460a05b7233abf3df737b73d23998fdcf21da924c9a495cc80c5d5402fbd9eba022f1e7a772a8664aac7a8966b87f5422b1c9bce51853fae2507c3195808d9986ed33e65966f15ade260bbb4e46e4973948587c8d09596ac65092e5e99b7fc850835b255c841f04c693d74049dca12f7bdf6bcbb00fb72b1e0826cfef6272258c331ab9b13e650787a3fe3fb5cd2de3c63582b50135f0f04c0fda0ce2a05a116481232ab1e8abf8bbbf7021c758a920f4cc294e707a1d7b8eb53b3c925e8bb131393e6377205515694a493053e4a74d1e74f13117f590dc5244e01d8525be94cf56724f7989bb02776f10e73fff14ca20094e060dc2d074b64d4035808418405120f84f63bc14eb63f259212c694e1a357ee40daea44a1f3f410a658090004330ce47d70544ce486ae379a7962dfa1089745b1602cc69c1bc9a3e2a7f14e7e1f46989e9befed402b63957e9442869bd5666627f3726971e4a210d764f52a0f57d6a724883a3528b744f7e83210eb0dea44041edb96fd5faca5d4562f89b9df8dfa91c72173f95d173c50c139484f6176e8b60fb0d29f1aedda363f928555f360c92fb7e605222d6d1e5bf978ffa816148ea36824103da48c9cbdbf523d6314a226e67ef7f6b81ad96f665fe357b752228b5577bb7565d1553f89cbfd4329e7b21546e196f8c49e526469073479e4a26a270c0724ae0d7f56346407274e45b4b29b6294043c6d5b1228552569d93a34ef2361382e0210df9a1f2f9f8e016d8c57b3504b517ebfa636fe5ceafcbd75a2adb48b04c74dbd6dbd96990d0db0e968be5793fa93887f491effd2fd5eb15a023115db549c1058ff4768056d41169160e2e06b1e4b2e31a6691c594dfbfe840701757fccee2dcf01a97d193718efaea50f19627e95051d6109734d6ac1b67efc0baa965f19a6b3a8821fff6a1a4222e7cf49261ca61fe84cfd4e96ea2300cfc987e550f8887c9bce93774cba932ffb2e1f4941f9316500890dc910c25d1d505ad298e3a17ef36969fb5cdc65560a7a0f165437f08ba2c5dd4b95228427d022654b0b4197f4f508c85f50043731391afaeb7d5ab826ae6d993a4e36807db2e154017430499ca514254766dc1f4a52954d48820a99ab335366743eb335ddd9763e73a6c761cbaa8b85ca85ff343d57a7c29814d8829d63fee4e3afa40d0cfefd8c695338f4d7c18fcaaef2022a059f355f154099d1905e5f0f3e6cfb1833d5f834b7d121450890cf249b79c2b157fb02b813e6f2f0213a1155b0e017939af790b63d54cac3aa5ca1382bad56f55c0f359d42a449314e07e7df0b189e93aca1def74d35711a8e1091ccef0d26fae04e0f269f2f0ad932bda552128b5f7eca7e3ce67223681c8f2ec4ad2fe21f404b16fcde5563600515785080a54c1e16ada56cf1f8cd63e7c32abcb3b882d5b40a7cc3822e7bc3289c162375e6ba497c36d9502e898ee67ec86352f935f80e89bee0c7837be7f3274054c0ed95adc5bf7601a4b7d99df9c50e1104a9a5fd09b07807c02954ba875e5a8f48dee9338c34ad22fa12e9a41cfd30aae2551947b7cc5c51b2af27cbe83c30441da2f303176c0440d425837779c7d4a03ef92e6e0c891aa0614fe8081c72c4c8360623f764be6fcd9daf6c9febba3edea8cfeb49ed244384604f0dd14e5e4b2aa6c037fdaab4a7b61267b21ef8e642a6062e481085dfaa3d01c0d7b953bd48bfb6fae8485a21f86455119c1ffcf806", 0xed2, r1) keyctl$get_persistent(0x16, 0x0, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r6, 0xaeb7, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 340.809762][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.858448][ T7706] device bridge_slave_1 entered promiscuous mode [ 340.920774][ T7693] team0: Port device team_slave_0 added [ 340.960611][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.981475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 341.040200][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 341.048561][ T7792] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 341.088652][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 341.140700][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 341.204646][ T7665] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 341.260407][ T7665] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 341.350253][ T7693] team0: Port device team_slave_1 added [ 341.372310][ T7706] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 341.441047][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 341.461621][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 341.502195][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.541567][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 341.568272][ T7724] ================================================================== [ 341.576407][ T7724] BUG: KCSAN: data-race in do_task_stat / flush_signal_handlers [ 341.585180][ T7724] [ 341.587506][ T7724] read to 0xffff888121820800 of 8 bytes by task 7736 on cpu 0: [ 341.595139][ T7724] do_task_stat+0x326/0x1370 [ 341.599732][ T7724] proc_tgid_stat+0x3d/0x60 [ 341.600827][ T7664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.604251][ T7724] proc_single_show+0x89/0xe0 [ 341.616622][ T7724] seq_read+0x350/0x960 [ 341.620780][ T7724] __vfs_read+0x67/0xc0 [ 341.624941][ T7724] vfs_read+0x143/0x2c0 [ 341.629093][ T7724] ksys_read+0xd5/0x1b0 [ 341.633242][ T7724] __x64_sys_read+0x4c/0x60 [ 341.637747][ T7724] do_syscall_64+0xcc/0x370 [ 341.642243][ T7724] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 341.648131][ T7724] [ 341.650457][ T7724] write to 0xffff888121820800 of 8 bytes by task 7724 on cpu 1: [ 341.658099][ T7724] flush_signal_handlers+0x6e/0xe0 [ 341.663210][ T7724] setup_new_exec+0x325/0x3d0 [ 341.667882][ T7724] load_elf_binary+0x78a/0x2ec0 [ 341.672744][ T7724] search_binary_handler+0x127/0x420 [ 341.678038][ T7724] __do_execve_file.isra.0+0xb76/0x11d0 [ 341.683579][ T7724] __x64_sys_execve+0x62/0x80 [ 341.688250][ T7724] do_syscall_64+0xcc/0x370 [ 341.692747][ T7724] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 341.698617][ T7724] [ 341.700928][ T7724] Reported by Kernel Concurrency Sanitizer on: [ 341.707072][ T7724] CPU: 1 PID: 7724 Comm: ifup Not tainted 5.4.0-rc7+ #0 [ 341.713996][ T7724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.724306][ T7724] ================================================================== [ 341.732367][ T7724] Kernel panic - not syncing: panic_on_warn set ... [ 341.738962][ T7724] CPU: 1 PID: 7724 Comm: ifup Not tainted 5.4.0-rc7+ #0 [ 341.745883][ T7724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.755929][ T7724] Call Trace: [ 341.759248][ T7724] dump_stack+0x11d/0x181 [ 341.763585][ T7724] panic+0x210/0x640 [ 341.767611][ T7724] ? vprintk_func+0x8d/0x140 [ 341.772216][ T7724] kcsan_report.cold+0xc/0xd [ 341.776814][ T7724] kcsan_setup_watchpoint+0x3fe/0x460 [ 341.782192][ T7724] __tsan_unaligned_write8+0xc4/0x100 [ 341.787558][ T7724] flush_signal_handlers+0x6e/0xe0 [ 341.792665][ T7724] setup_new_exec+0x325/0x3d0 [ 341.797353][ T7724] load_elf_binary+0x78a/0x2ec0 [ 341.802199][ T7724] ? __read_once_size.constprop.0+0x12/0x20 [ 341.808090][ T7724] ? __sanitizer_cov_trace_const_cmp1+0x11/0x20 [ 341.814325][ T7724] ? refcount_sub_and_test_checked+0xc8/0x190 [ 341.820389][ T7724] ? refcount_dec_and_test_checked+0x2c/0x40 [ 341.827058][ T7724] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 341.833296][ T7724] ? _raw_read_unlock+0x34/0x50 [ 341.838146][ T7724] search_binary_handler+0x127/0x420 [ 341.843947][ T7724] __do_execve_file.isra.0+0xb76/0x11d0 [ 341.849494][ T7724] __x64_sys_execve+0x62/0x80 [ 341.854172][ T7724] do_syscall_64+0xcc/0x370 [ 341.858673][ T7724] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 341.864553][ T7724] RIP: 0033:0x7f3f95c66207 [ 341.868967][ T7724] Code: Bad RIP value. [ 341.873031][ T7724] RSP: 002b:00007fffe467c1c8 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 341.881438][ T7724] RAX: ffffffffffffffda RBX: 00000000025455f8 RCX: 00007f3f95c66207 [ 341.889404][ T7724] RDX: 0000000002545618 RSI: 00000000025455f8 RDI: 0000000002545678 [ 341.897365][ T7724] RBP: 0000000002545678 R08: 0000000002545598 R09: 00007f3f95cdda00 [ 341.905328][ T7724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000002545618 [ 341.913301][ T7724] R13: 0000000002545618 R14: 0000000000000001 R15: 0000000000000000 [ 341.922729][ T7724] Kernel Offset: disabled [ 341.927054][ T7724] Rebooting in 86400 seconds..