[ 54.151239][ T26] audit: type=1800 audit(1572964905.980:26): pid=7981 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 54.200111][ T26] audit: type=1800 audit(1572964905.980:27): pid=7981 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 54.232127][ T26] audit: type=1800 audit(1572964905.980:28): pid=7981 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 55.078140][ T8044] sshd (8044) used greatest stack depth: 10128 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.23' (ECDSA) to the list of known hosts. 2019/11/05 14:41:57 fuzzer started 2019/11/05 14:41:59 dialing manager at 10.128.0.105:43787 2019/11/05 14:42:00 syscalls: 2553 2019/11/05 14:42:00 code coverage: enabled 2019/11/05 14:42:00 comparison tracing: enabled 2019/11/05 14:42:00 extra coverage: extra coverage is not supported by the kernel 2019/11/05 14:42:00 setuid sandbox: enabled 2019/11/05 14:42:00 namespace sandbox: enabled 2019/11/05 14:42:00 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 14:42:00 fault injection: enabled 2019/11/05 14:42:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 14:42:00 net packet injection: enabled 2019/11/05 14:42:00 net device setup: enabled 2019/11/05 14:42:00 concurrency sanitizer: enabled 2019/11/05 14:42:00 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/05 14:42:02 adding functions to KCSAN blacklist: 'tomoyo_supervisor' 'osq_lock' 'pipe_wait' 'pipe_poll' 'mod_timer' '__hrtimer_run_queues' 'tick_do_update_jiffies64' 'rcu_gp_fqs_check_wake' 'get_task_cred' 'ktime_get_real_seconds' 'wbt_done' 'ep_poll' 'tcp_add_backlog' 'tick_sched_do_timer' 'find_next_bit' 'generic_write_end' 'task_dump_owner' 'pid_update_inode' 'blk_mq_sched_dispatch_requests' 'do_nanosleep' 'ext4_free_inode' 'generic_permission' 14:42:10 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\x12\x9d\xae\x8f\xa9?/&\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x8a\xca/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xd0>\xd6#\xe1^\xa5\xfb\xff\x03\xf8\x00\x00\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\t\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b%\xb8|\x9e1\x9b\xdb\xaf8\xc0\f\xd3\xe2}bLr,\xda\xa0!\x03\xe9\xdb@\x92\xe0D\x8f=\xd9\xc0\x00\xfd+\xac-I\xa5\x04o\xa7\x1e\xbc#$d\xfc\x04\xec\xeb\x9f\xe0\xc2S3:\xfe\x9eOFd\x99\xa03(9\x1d\x87\x97?~\x1a9\xe0\x90z\x8e\x8f~\x96\x18Q\xa6\xb3\xfd\x953~L\xfa2\xbc\xc1\xe5\x12F`\xa6\xa1\x8e\x8e\r\x9e\xb5L\b+\"\xd1\xd0\x8eb\xd9\x1c\x87+\x83=X[\x95@?\'\xf2\xde0\xf9\xf9\xc3\x98Ev=\xb5\xa6\xc5\x87\xd8%\xd6\xf0\x98\xe6*\xe1K\xc4e', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x200000000001fa) 14:42:10 executing program 1: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x2) epoll_create1(0x80000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syzkaller login: [ 78.578708][ T8155] IPVS: ftp: loaded support on port[0] = 21 [ 78.675033][ T8155] chnl_net:caif_netlink_parms(): no params data found [ 78.738599][ T8155] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.746061][ T8155] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.754459][ T8155] device bridge_slave_0 entered promiscuous mode [ 78.763053][ T8155] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.770382][ T8155] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.782504][ T8155] device bridge_slave_1 entered promiscuous mode [ 78.813917][ T8155] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.825572][ T8155] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.829150][ T8158] IPVS: ftp: loaded support on port[0] = 21 [ 78.848194][ T8155] team0: Port device team_slave_0 added [ 78.855085][ T8155] team0: Port device team_slave_1 added 14:42:10 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="c6292fdfe740aba82d39d230ab243347a178fb1fb08609f55c860b7274ce37fba681b500d0c814f800b8011a484e65b37e866369e0751b310c2e4c24e0ef4ea10fc5291793ea975cc22ca7c07ced93b665d9e45871f7687d63f44d4d868a2bf9e07a4bbec7665b0a0fe52f521c2b62"], 0xfc7c) fallocate(r0, 0x8, 0x0, 0x8000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) r1 = open(&(0x7f0000000200)='./file0\x00', 0x6b814fd20e863d85, 0x0) write(r1, &(0x7f0000000600)='4', 0x1) [ 78.934183][ T8155] device hsr_slave_0 entered promiscuous mode [ 78.991534][ T8155] device hsr_slave_1 entered promiscuous mode [ 79.224420][ T8155] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.231726][ T8155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.239839][ T8155] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.247754][ T8155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.381415][ T8158] chnl_net:caif_netlink_parms(): no params data found [ 79.417604][ T8164] IPVS: ftp: loaded support on port[0] = 21 [ 79.496325][ T8155] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.523877][ T8158] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.530959][ T8158] bridge0: port 1(bridge_slave_0) entered disabled state 14:42:11 executing program 3: timer_create(0x0, 0x0, &(0x7f0000044000)) r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000400)) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000004c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0xffffffffffffff62) sendto$inet(r2, &(0x7f0000a88f88), 0x0, 0x2000f401, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f0000000240)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000180), &(0x7f0000000300)=0x4) r3 = socket$pppoe(0x18, 0x1, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)={0x0, 0x0, 0x10001, 0x0, 0x0, 0x200000}) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) fsetxattr(r3, &(0x7f00000003c0)=@known='system.sockprotoname\x00', &(0x7f0000000440)='\x00', 0x1, 0x1) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') [ 79.562083][ T8158] device bridge_slave_0 entered promiscuous mode [ 79.598951][ T8155] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.622079][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.653350][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.693075][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.715603][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 79.777084][ T8158] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.801236][ T8158] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.809818][ T8158] device bridge_slave_1 entered promiscuous mode [ 79.904430][ T8158] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.933522][ T8158] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.988923][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 80.043644][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 80.077725][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.084911][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.151496][ T8158] team0: Port device team_slave_0 added [ 80.158781][ T8158] team0: Port device team_slave_1 added [ 80.213857][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 80.233432][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 80.261913][ T8185] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.269060][ T8185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.321898][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 80.354202][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 80.382553][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 80.422077][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 80.454556][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 80.482226][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 14:42:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) [ 80.518222][ T8155] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 80.561266][ T8155] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 80.644183][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 80.683557][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 80.723267][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 80.752396][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 80.791801][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 80.836254][ T8188] IPVS: ftp: loaded support on port[0] = 21 [ 80.913884][ T8158] device hsr_slave_0 entered promiscuous mode [ 80.951535][ T8158] device hsr_slave_1 entered promiscuous mode 14:42:12 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$alg(0x26, 0x5, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x200, 0x0) socket(0x10, 0x803, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x304}, 0x9c) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x400}, &(0x7f0000000280)=0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) [ 81.002679][ T8158] debugfs: Directory 'hsr0' with parent '/' already present! [ 81.035342][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 81.101813][ T8193] IPVS: ftp: loaded support on port[0] = 21 [ 81.167492][ T8164] chnl_net:caif_netlink_parms(): no params data found [ 81.225204][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 81.237544][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 81.293685][ T8155] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 81.497446][ T8223] IPVS: ftp: loaded support on port[0] = 21 [ 81.502220][ T8164] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.510750][ T8164] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.538530][ T8164] device bridge_slave_0 entered promiscuous mode [ 81.564404][ T8158] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.612485][ T8164] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.619657][ T8164] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.642167][ T8164] device bridge_slave_1 entered promiscuous mode [ 81.716899][ T8158] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.756797][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.772267][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.824382][ T8188] chnl_net:caif_netlink_parms(): no params data found [ 81.853551][ T8164] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.904362][ T8164] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.944296][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 14:42:13 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\x12\x9d\xae\x8f\xa9?/&\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x8a\xca/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xd0>\xd6#\xe1^\xa5\xfb\xff\x03\xf8\x00\x00\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\t\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b%\xb8|\x9e1\x9b\xdb\xaf8\xc0\f\xd3\xe2}bLr,\xda\xa0!\x03\xe9\xdb@\x92\xe0D\x8f=\xd9\xc0\x00\xfd+\xac-I\xa5\x04o\xa7\x1e\xbc#$d\xfc\x04\xec\xeb\x9f\xe0\xc2S3:\xfe\x9eOFd\x99\xa03(9\x1d\x87\x97?~\x1a9\xe0\x90z\x8e\x8f~\x96\x18Q\xa6\xb3\xfd\x953~L\xfa2\xbc\xc1\xe5\x12F`\xa6\xa1\x8e\x8e\r\x9e\xb5L\b+\"\xd1\xd0\x8eb\xd9\x1c\x87+\x83=X[\x95@?\'\xf2\xde0\xf9\xf9\xc3\x98Ev=\xb5\xa6\xc5\x87\xd8%\xd6\xf0\x98\xe6*\xe1K\xc4e', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x200000000001fa) [ 81.972560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.999039][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.006242][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.051955][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.081907][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.114961][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.122116][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.153660][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.202248][ T8193] chnl_net:caif_netlink_parms(): no params data found [ 82.268186][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.291963][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:42:14 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\x12\x9d\xae\x8f\xa9?/&\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x8a\xca/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xd0>\xd6#\xe1^\xa5\xfb\xff\x03\xf8\x00\x00\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\t\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b%\xb8|\x9e1\x9b\xdb\xaf8\xc0\f\xd3\xe2}bLr,\xda\xa0!\x03\xe9\xdb@\x92\xe0D\x8f=\xd9\xc0\x00\xfd+\xac-I\xa5\x04o\xa7\x1e\xbc#$d\xfc\x04\xec\xeb\x9f\xe0\xc2S3:\xfe\x9eOFd\x99\xa03(9\x1d\x87\x97?~\x1a9\xe0\x90z\x8e\x8f~\x96\x18Q\xa6\xb3\xfd\x953~L\xfa2\xbc\xc1\xe5\x12F`\xa6\xa1\x8e\x8e\r\x9e\xb5L\b+\"\xd1\xd0\x8eb\xd9\x1c\x87+\x83=X[\x95@?\'\xf2\xde0\xf9\xf9\xc3\x98Ev=\xb5\xa6\xc5\x87\xd8%\xd6\xf0\x98\xe6*\xe1K\xc4e', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x200000000001fa) [ 82.314848][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.364724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.404922][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 82.424831][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.464765][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 82.476097][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.497124][ T8164] team0: Port device team_slave_0 added [ 82.519232][ T8158] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 82.546220][ T8158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 82.570464][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.602871][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 82.624739][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 14:42:14 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\x12\x9d\xae\x8f\xa9?/&\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x8a\xca/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xd0>\xd6#\xe1^\xa5\xfb\xff\x03\xf8\x00\x00\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\t\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b%\xb8|\x9e1\x9b\xdb\xaf8\xc0\f\xd3\xe2}bLr,\xda\xa0!\x03\xe9\xdb@\x92\xe0D\x8f=\xd9\xc0\x00\xfd+\xac-I\xa5\x04o\xa7\x1e\xbc#$d\xfc\x04\xec\xeb\x9f\xe0\xc2S3:\xfe\x9eOFd\x99\xa03(9\x1d\x87\x97?~\x1a9\xe0\x90z\x8e\x8f~\x96\x18Q\xa6\xb3\xfd\x953~L\xfa2\xbc\xc1\xe5\x12F`\xa6\xa1\x8e\x8e\r\x9e\xb5L\b+\"\xd1\xd0\x8eb\xd9\x1c\x87+\x83=X[\x95@?\'\xf2\xde0\xf9\xf9\xc3\x98Ev=\xb5\xa6\xc5\x87\xd8%\xd6\xf0\x98\xe6*\xe1K\xc4e', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x200000000001fa) [ 82.681195][ T8188] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.688682][ T8188] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.702069][ T8188] device bridge_slave_0 entered promiscuous mode [ 82.732516][ T8164] team0: Port device team_slave_1 added [ 82.760795][ T8158] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.854398][ T8188] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.875072][ T8188] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.892591][ T8188] device bridge_slave_1 entered promiscuous mode [ 82.942620][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 82.950418][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 82.994266][ T8193] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.025310][ T8193] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.042183][ T8193] device bridge_slave_0 entered promiscuous mode 14:42:14 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\x12\x9d\xae\x8f\xa9?/&\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x8a\xca/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xd0>\xd6#\xe1^\xa5\xfb\xff\x03\xf8\x00\x00\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\t\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b%\xb8|\x9e1\x9b\xdb\xaf8\xc0\f\xd3\xe2}bLr,\xda\xa0!\x03\xe9\xdb@\x92\xe0D\x8f=\xd9\xc0\x00\xfd+\xac-I\xa5\x04o\xa7\x1e\xbc#$d\xfc\x04\xec\xeb\x9f\xe0\xc2S3:\xfe\x9eOFd\x99\xa03(9\x1d\x87\x97?~\x1a9\xe0\x90z\x8e\x8f~\x96\x18Q\xa6\xb3\xfd\x953~L\xfa2\xbc\xc1\xe5\x12F`\xa6\xa1\x8e\x8e\r\x9e\xb5L\b+\"\xd1\xd0\x8eb\xd9\x1c\x87+\x83=X[\x95@?\'\xf2\xde0\xf9\xf9\xc3\x98Ev=\xb5\xa6\xc5\x87\xd8%\xd6\xf0\x98\xe6*\xe1K\xc4e', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x200000000001fa) [ 83.084596][ T8164] device hsr_slave_0 entered promiscuous mode [ 83.151617][ T8164] device hsr_slave_1 entered promiscuous mode [ 83.181345][ T8164] debugfs: Directory 'hsr0' with parent '/' already present! 14:42:15 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\x12\x9d\xae\x8f\xa9?/&\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x8a\xca/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xd0>\xd6#\xe1^\xa5\xfb\xff\x03\xf8\x00\x00\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\t\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b%\xb8|\x9e1\x9b\xdb\xaf8\xc0\f\xd3\xe2}bLr,\xda\xa0!\x03\xe9\xdb@\x92\xe0D\x8f=\xd9\xc0\x00\xfd+\xac-I\xa5\x04o\xa7\x1e\xbc#$d\xfc\x04\xec\xeb\x9f\xe0\xc2S3:\xfe\x9eOFd\x99\xa03(9\x1d\x87\x97?~\x1a9\xe0\x90z\x8e\x8f~\x96\x18Q\xa6\xb3\xfd\x953~L\xfa2\xbc\xc1\xe5\x12F`\xa6\xa1\x8e\x8e\r\x9e\xb5L\b+\"\xd1\xd0\x8eb\xd9\x1c\x87+\x83=X[\x95@?\'\xf2\xde0\xf9\xf9\xc3\x98Ev=\xb5\xa6\xc5\x87\xd8%\xd6\xf0\x98\xe6*\xe1K\xc4e', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x200000000001fa) [ 83.206986][ T8193] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.214277][ T8193] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.224252][ T8193] device bridge_slave_1 entered promiscuous mode [ 83.244301][ T8223] chnl_net:caif_netlink_parms(): no params data found [ 83.291115][ T8188] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.368777][ T8188] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.435228][ T8193] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.482750][ T8193] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:42:15 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\x12\x9d\xae\x8f\xa9?/&\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x8a\xca/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xd0>\xd6#\xe1^\xa5\xfb\xff\x03\xf8\x00\x00\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\t\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b%\xb8|\x9e1\x9b\xdb\xaf8\xc0\f\xd3\xe2}bLr,\xda\xa0!\x03\xe9\xdb@\x92\xe0D\x8f=\xd9\xc0\x00\xfd+\xac-I\xa5\x04o\xa7\x1e\xbc#$d\xfc\x04\xec\xeb\x9f\xe0\xc2S3:\xfe\x9eOFd\x99\xa03(9\x1d\x87\x97?~\x1a9\xe0\x90z\x8e\x8f~\x96\x18Q\xa6\xb3\xfd\x953~L\xfa2\xbc\xc1\xe5\x12F`\xa6\xa1\x8e\x8e\r\x9e\xb5L\b+\"\xd1\xd0\x8eb\xd9\x1c\x87+\x83=X[\x95@?\'\xf2\xde0\xf9\xf9\xc3\x98Ev=\xb5\xa6\xc5\x87\xd8%\xd6\xf0\x98\xe6*\xe1K\xc4e', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x200000000001fa) [ 83.640631][ T8188] team0: Port device team_slave_0 added [ 83.650103][ T8223] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.675995][ T8223] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.753598][ T8223] device bridge_slave_0 entered promiscuous mode [ 83.782136][ T8223] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.789217][ T8223] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.854856][ T8223] device bridge_slave_1 entered promiscuous mode [ 83.881438][ T8193] team0: Port device team_slave_0 added [ 83.893920][ T8188] team0: Port device team_slave_1 added [ 83.930251][ T8164] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.958298][ T8193] team0: Port device team_slave_1 added 14:42:15 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\x12\x9d\xae\x8f\xa9?/&\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x8a\xca/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xd0>\xd6#\xe1^\xa5\xfb\xff\x03\xf8\x00\x00\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\t\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b%\xb8|\x9e1\x9b\xdb\xaf8\xc0\f\xd3\xe2}bLr,\xda\xa0!\x03\xe9\xdb@\x92\xe0D\x8f=\xd9\xc0\x00\xfd+\xac-I\xa5\x04o\xa7\x1e\xbc#$d\xfc\x04\xec\xeb\x9f\xe0\xc2S3:\xfe\x9eOFd\x99\xa03(9\x1d\x87\x97?~\x1a9\xe0\x90z\x8e\x8f~\x96\x18Q\xa6\xb3\xfd\x953~L\xfa2\xbc\xc1\xe5\x12F`\xa6\xa1\x8e\x8e\r\x9e\xb5L\b+\"\xd1\xd0\x8eb\xd9\x1c\x87+\x83=X[\x95@?\'\xf2\xde0\xf9\xf9\xc3\x98Ev=\xb5\xa6\xc5\x87\xd8%\xd6\xf0\x98\xe6*\xe1K\xc4e', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x200000000001fa) [ 84.023805][ T8164] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.057663][ T8223] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.144228][ T8188] device hsr_slave_0 entered promiscuous mode [ 84.176399][ T8188] device hsr_slave_1 entered promiscuous mode [ 84.231188][ T8188] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.273910][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.291066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:42:16 executing program 1: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x2) epoll_create1(0x80000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 84.322585][ T8223] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.403259][ T8223] team0: Port device team_slave_0 added [ 84.409946][ T8223] team0: Port device team_slave_1 added [ 84.513864][ T8193] device hsr_slave_0 entered promiscuous mode [ 84.565655][ T8193] device hsr_slave_1 entered promiscuous mode [ 84.612362][ T8193] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.654668][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.674052][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.710831][ T8185] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.718139][ T8185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.767349][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.798305][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.830923][ T8185] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.838238][ T8185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.897781][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.915866][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.033073][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.053731][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 85.092245][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 85.139079][ T8164] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 85.221239][ T8164] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 85.343970][ T8223] device hsr_slave_0 entered promiscuous mode [ 85.385258][ T8223] device hsr_slave_1 entered promiscuous mode [ 85.444971][ T8223] debugfs: Directory 'hsr0' with parent '/' already present! [ 85.472537][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.485297][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 85.564579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.626391][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.692242][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.756257][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.796026][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.947424][ T8164] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.019311][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 86.053577][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 86.109731][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 86.356214][ T8188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.419844][ T8193] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.480757][ T8188] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.568763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.586190][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.677539][ T8193] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.774277][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.792178][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.800049][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 86.921814][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.930494][ T8187] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.937663][ T8187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.111867][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 87.120723][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.235578][ T8187] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.242785][ T8187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.291820][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 87.376089][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 87.442524][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 87.511679][ T8187] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 87.590768][ T8223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.697608][ T8188] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 87.815760][ T8188] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 87.895848][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.917026][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 87.962299][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.011369][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.066618][ T8185] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.073731][ T8185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.132451][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.171790][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.218749][ T8185] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.226077][ T8185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.275864][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.312383][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.328809][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.352451][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.365363][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.374854][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.384407][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 88.393341][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.402583][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 88.421491][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.500650][ T8223] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.616888][ T8188] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.712128][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.721593][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.803481][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 88.871964][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.880005][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.017615][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.081994][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.161276][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.231767][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.295901][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.346043][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.415833][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 89.471397][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 89.483262][ T8193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.565535][ T8223] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 89.678174][ T8223] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 89.721441][ T8339] ================================================================== [ 89.729622][ T8339] BUG: KCSAN: data-race in exit_signals / proc_task_name [ 89.736645][ T8339] [ 89.739227][ T8339] write to 0xffff8881036a60a4 of 4 bytes by task 8318 on cpu 1: [ 89.746875][ T8339] exit_signals+0x13b/0x490 [ 89.751407][ T8339] do_exit+0x18b/0x18f0 [ 89.755575][ T8339] do_group_exit+0xb4/0x1c0 [ 89.760094][ T8339] __x64_sys_exit_group+0x2e/0x30 [ 89.765311][ T8339] do_syscall_64+0xcc/0x370 [ 89.769833][ T8339] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 89.775720][ T8339] [ 89.778061][ T8339] read to 0xffff8881036a60a4 of 4 bytes by task 8339 on cpu 0: [ 89.785636][ T8339] proc_task_name+0x41/0x2a0 [ 89.790239][ T8339] proc_pid_status+0x70/0x1000 [ 89.795106][ T8339] proc_single_show+0x89/0xe0 [ 89.799791][ T8339] seq_read+0x350/0x960 [ 89.804093][ T8339] __vfs_read+0x67/0xc0 [ 89.808336][ T8339] vfs_read+0x143/0x2c0 [ 89.812669][ T8339] ksys_read+0xd5/0x1b0 [ 89.816838][ T8339] __x64_sys_read+0x4c/0x60 [ 89.821451][ T8339] do_syscall_64+0xcc/0x370 [ 89.825970][ T8339] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 89.831916][ T8339] [ 89.834240][ T8339] Reported by Kernel Concurrency Sanitizer on: [ 89.840487][ T8339] CPU: 0 PID: 8339 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 89.847421][ T8339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.857566][ T8339] ================================================================== [ 89.865628][ T8339] Kernel panic - not syncing: panic_on_warn set ... [ 89.872426][ T8339] CPU: 0 PID: 8339 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 89.879190][ T8339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.889282][ T8339] Call Trace: [ 89.892644][ T8339] dump_stack+0xf5/0x159 [ 89.896907][ T8339] panic+0x210/0x640 [ 89.900823][ T8339] ? vprintk_func+0x8d/0x140 [ 89.905456][ T8339] kcsan_report.cold+0xc/0xe [ 89.910069][ T8339] kcsan_setup_watchpoint+0x3fe/0x410 [ 89.915462][ T8339] __tsan_read4+0x145/0x1f0 [ 89.919997][ T8339] proc_task_name+0x41/0x2a0 [ 89.924620][ T8339] ? strlen+0x3b/0x60 [ 89.928615][ T8339] ? seq_puts+0xae/0xe0 [ 89.933007][ T8339] proc_pid_status+0x70/0x1000 [ 89.937872][ T8339] ? __read_once_size.constprop.0+0x12/0x20 [ 89.943801][ T8339] proc_single_show+0x89/0xe0 [ 89.948491][ T8339] seq_read+0x350/0x960 [ 89.952677][ T8339] ? security_file_permission+0x88/0x280 [ 89.955690][ T8223] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.958341][ T8339] __vfs_read+0x67/0xc0 [ 89.969433][ T8339] ? seq_hlist_start_head_rcu+0x60/0x60 [ 89.975010][ T8339] vfs_read+0x143/0x2c0 [ 89.979188][ T8339] ksys_read+0xd5/0x1b0 [ 89.983381][ T8339] __x64_sys_read+0x4c/0x60 [ 89.988008][ T8339] do_syscall_64+0xcc/0x370 [ 89.992532][ T8339] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 89.998586][ T8339] RIP: 0033:0x7fe8d5286310 [ 90.003026][ T8339] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 90.022640][ T8339] RSP: 002b:00007ffdb5a65e68 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 90.031066][ T8339] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007fe8d5286310 [ 90.039054][ T8339] RDX: 0000000000000fff RSI: 00007fe8d5753d00 RDI: 0000000000000006 [ 90.047044][ T8339] RBP: 0000000000000fff R08: 0000000000000000 R09: 00007fe8d554e57b [ 90.055292][ T8339] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe8d5753d00 [ 90.063284][ T8339] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 90.073630][ T8339] Kernel Offset: disabled [ 90.078094][ T8339] Rebooting in 86400 seconds..