[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 64.816798][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 64.816808][ T26] audit: type=1800 audit(1567777095.635:29): pid=9599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 64.852562][ T26] audit: type=1800 audit(1567777095.635:30): pid=9599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.19' (ECDSA) to the list of known hosts. 2019/09/06 13:38:25 fuzzer started 2019/09/06 13:38:27 dialing manager at 10.128.0.26:38111 2019/09/06 13:38:27 syscalls: 2332 2019/09/06 13:38:27 code coverage: enabled 2019/09/06 13:38:27 comparison tracing: enabled 2019/09/06 13:38:27 extra coverage: extra coverage is not supported by the kernel 2019/09/06 13:38:27 setuid sandbox: enabled 2019/09/06 13:38:27 namespace sandbox: enabled 2019/09/06 13:38:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/06 13:38:27 fault injection: enabled 2019/09/06 13:38:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/06 13:38:27 net packet injection: enabled 2019/09/06 13:38:27 net device setup: enabled 13:40:22 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[@ANYRES64], 0xfffffea6) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xb778) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, 0x0) r3 = accept(r2, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000000e, 0x0) syzkaller login: [ 191.644197][ T9767] IPVS: ftp: loaded support on port[0] = 21 13:40:22 executing program 1: r0 = creat(0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) set_tid_address(&(0x7f0000000240)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast2, @remote}, &(0x7f0000000380)=0xc) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRES32=r1, @ANYRES32]) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000200)) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) set_robust_list(&(0x7f0000000280)={0x0, 0xffffffff80000000, &(0x7f0000000140)={&(0x7f0000000040)}}, 0x18) [ 191.718920][ T9767] chnl_net:caif_netlink_parms(): no params data found [ 191.751417][ T9767] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.759208][ T9767] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.770383][ T9767] device bridge_slave_0 entered promiscuous mode [ 191.783956][ T9767] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.803701][ T9767] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.823759][ T9767] device bridge_slave_1 entered promiscuous mode [ 191.854305][ T9767] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 13:40:22 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000)=0x916, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) [ 191.875163][ T9767] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.897403][ T9767] team0: Port device team_slave_0 added [ 191.905166][ T9767] team0: Port device team_slave_1 added [ 191.912629][ T9770] IPVS: ftp: loaded support on port[0] = 21 [ 191.965856][ T9767] device hsr_slave_0 entered promiscuous mode [ 192.013948][ T9772] IPVS: ftp: loaded support on port[0] = 21 [ 192.023996][ T9767] device hsr_slave_1 entered promiscuous mode 13:40:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000700)='\x00', 0x0) pwritev(r2, &(0x7f0000000240)=[{&(0x7f0000000440)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, 0x0, 0x20020102000007) dup2(r2, r1) [ 192.094655][ T9767] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.101738][ T9767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.109079][ T9767] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.116155][ T9767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.238294][ T9775] IPVS: ftp: loaded support on port[0] = 21 13:40:23 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x7000) [ 192.314984][ T9770] chnl_net:caif_netlink_parms(): no params data found [ 192.326881][ T9767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.389489][ T9767] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.424770][ T9772] chnl_net:caif_netlink_parms(): no params data found [ 192.433026][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.441394][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.466482][ T9779] IPVS: ftp: loaded support on port[0] = 21 [ 192.474792][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.484782][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 192.535717][ T9770] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.542801][ T9770] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.552030][ T9770] device bridge_slave_0 entered promiscuous mode [ 192.564949][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.573219][ T22] bridge0: port 1(bridge_slave_0) entered blocking state 13:40:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000740)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffc46) [ 192.580295][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.589643][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.598160][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.605233][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.625754][ T9770] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.636871][ T9770] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.646031][ T9770] device bridge_slave_1 entered promiscuous mode [ 192.681830][ T9775] chnl_net:caif_netlink_parms(): no params data found [ 192.719680][ T9778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.729491][ T9783] IPVS: ftp: loaded support on port[0] = 21 [ 192.731717][ T9778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.743986][ T9778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.752258][ T9778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.768143][ T9770] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.777811][ T9772] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.784917][ T9772] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.792521][ T9772] device bridge_slave_0 entered promiscuous mode [ 192.799980][ T9772] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.807196][ T9772] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.814799][ T9772] device bridge_slave_1 entered promiscuous mode [ 192.844915][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.853338][ T9770] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.877246][ T9767] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 192.887729][ T9767] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 192.902475][ T9775] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.909664][ T9775] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.917311][ T9775] device bridge_slave_0 entered promiscuous mode [ 192.929087][ T9775] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.936189][ T9775] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.943597][ T9775] device bridge_slave_1 entered promiscuous mode [ 192.950670][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.958913][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.967070][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.975236][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.984265][ T9770] team0: Port device team_slave_0 added [ 192.990298][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.014681][ T9772] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.032388][ T9770] team0: Port device team_slave_1 added [ 193.060477][ T9772] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.070774][ T9775] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.115072][ T9770] device hsr_slave_0 entered promiscuous mode [ 193.153943][ T9770] device hsr_slave_1 entered promiscuous mode [ 193.193735][ T9770] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.207889][ T9779] chnl_net:caif_netlink_parms(): no params data found [ 193.225220][ T9775] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.251777][ T9772] team0: Port device team_slave_0 added [ 193.259446][ T9775] team0: Port device team_slave_0 added [ 193.266334][ T9775] team0: Port device team_slave_1 added [ 193.274194][ T9767] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.286054][ T9772] team0: Port device team_slave_1 added [ 193.366777][ T9775] device hsr_slave_0 entered promiscuous mode [ 193.404948][ T9775] device hsr_slave_1 entered promiscuous mode [ 193.453762][ T9775] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.490672][ T9779] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.498386][ T9779] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.521743][ T9779] device bridge_slave_0 entered promiscuous mode [ 193.566322][ T9772] device hsr_slave_0 entered promiscuous mode [ 193.593960][ T9772] device hsr_slave_1 entered promiscuous mode [ 193.653714][ T9772] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.671145][ T9775] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.678235][ T9775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.685562][ T9775] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.692694][ T9775] bridge0: port 1(bridge_slave_0) entered forwarding state 13:40:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000178, 0x0) [ 193.704785][ T9779] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.712225][ T9779] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.720463][ T9779] device bridge_slave_1 entered promiscuous mode [ 193.729561][ T9783] chnl_net:caif_netlink_parms(): no params data found [ 193.788631][ T9770] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.800278][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 193.808849][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.817206][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.848903][ T9779] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.872734][ T9783] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.881354][ T9783] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.891658][ T9783] device bridge_slave_0 entered promiscuous mode 13:40:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_ADMIT_BYTES={0x8, 0x7}]}}]}, 0x38}}, 0x0) [ 193.901272][ T9783] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.910645][ T9783] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.919241][ T9783] device bridge_slave_1 entered promiscuous mode [ 193.935869][ T9779] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.952363][ T9770] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.981817][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.991144][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.998984][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.007403][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.015731][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.022786][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.030820][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 13:40:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_ADMIT_BYTES={0x8, 0x7}]}}]}, 0x38}}, 0x0) [ 194.055007][ T9775] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.062961][ T9783] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.081200][ T9783] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.095840][ T9784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.107482][ T9784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.130900][ T9784] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.138107][ T9784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.146388][ T9784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.165006][ T9775] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.177546][ T9779] team0: Port device team_slave_0 added [ 194.190629][ T9783] team0: Port device team_slave_0 added [ 194.197270][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.205792][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.215565][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.223913][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.231609][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.239502][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.248416][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.257387][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 13:40:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_ADMIT_BYTES={0x8, 0x7}]}}]}, 0x38}}, 0x0) [ 194.271885][ T9770] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 194.282667][ T9770] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.297194][ T9779] team0: Port device team_slave_1 added [ 194.312621][ T9783] team0: Port device team_slave_1 added [ 194.321490][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.330795][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.339087][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.347531][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.356242][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.363366][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.370917][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.379478][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.387586][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.396069][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.404523][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.411556][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.419534][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.475287][ T9783] device hsr_slave_0 entered promiscuous mode [ 194.513885][ T9783] device hsr_slave_1 entered promiscuous mode 13:40:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_ADMIT_BYTES={0x8, 0x7}]}}]}, 0x38}}, 0x0) [ 194.573703][ T9783] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.584648][ T9778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.599610][ T9772] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.593744][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 299.600485][ C1] rcu: 1-...!: (10499 ticks this GP) idle=fb2/1/0x4000000000000002 softirq=10524/10524 fqs=114 [ 299.610972][ C1] (t=10500 jiffies g=9925 q=131) [ 299.616605][ C1] rcu: rcu_preempt kthread starved for 10257 jiffies! g9925 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 [ 299.627852][ C1] rcu: RCU grace-period kthread stack dump: [ 299.633719][ C1] rcu_preempt I29688 10 2 0x80004000 [ 299.640034][ C1] Call Trace: [ 299.643440][ C1] __schedule+0x755/0x1580 [ 299.647839][ C1] ? __sched_text_start+0x8/0x8 [ 299.652670][ C1] schedule+0xd9/0x260 [ 299.656716][ C1] schedule_timeout+0x486/0xc50 [ 299.661594][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 299.666516][ C1] ? usleep_range+0x170/0x170 [ 299.671204][ C1] ? trace_hardirqs_on+0x67/0x240 [ 299.676238][ C1] ? __kasan_check_read+0x11/0x20 [ 299.681277][ C1] ? __next_timer_interrupt+0x1a0/0x1a0 [ 299.686816][ C1] ? swake_up_one+0x60/0x60 [ 299.691317][ C1] rcu_gp_kthread+0x9b2/0x18c0 [ 299.696062][ C1] ? rcu_barrier+0x310/0x310 [ 299.700636][ C1] ? trace_hardirqs_on+0x67/0x240 [ 299.705644][ C1] ? __kasan_check_read+0x11/0x20 [ 299.710684][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 299.716925][ C1] ? __kthread_parkme+0x108/0x1c0 [ 299.722022][ C1] ? __kasan_check_read+0x11/0x20 [ 299.727024][ C1] kthread+0x361/0x430 [ 299.731082][ C1] ? rcu_barrier+0x310/0x310 [ 299.735650][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 299.741866][ C1] ret_from_fork+0x24/0x30 [ 299.746283][ C1] NMI backtrace for cpu 1 [ 299.750629][ C1] CPU: 1 PID: 17 Comm: kworker/1:0 Not tainted 5.3.0-rc7+ #0 [ 299.757970][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.768061][ C1] Workqueue: ipv6_addrconf addrconf_dad_work [ 299.774013][ C1] Call Trace: [ 299.777273][ C1] [ 299.780122][ C1] dump_stack+0x172/0x1f0 [ 299.784430][ C1] nmi_cpu_backtrace.cold+0x70/0xb2 [ 299.789606][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.795882][ C1] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 299.801493][ C1] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 299.807450][ C1] arch_trigger_cpumask_backtrace+0x14/0x20 [ 299.813318][ C1] rcu_dump_cpu_stacks+0x183/0x1cf [ 299.818411][ C1] rcu_sched_clock_irq.cold+0x4dd/0xc13 [ 299.823991][ C1] ? raise_softirq+0x138/0x340 [ 299.828736][ C1] update_process_times+0x32/0x80 [ 299.833768][ C1] tick_sched_handle+0xa2/0x190 [ 299.838598][ C1] tick_sched_timer+0x53/0x140 [ 299.843349][ C1] __hrtimer_run_queues+0x364/0xe40 [ 299.848525][ C1] ? tick_sched_do_timer+0x1b0/0x1b0 [ 299.853789][ C1] ? hrtimer_start_range_ns+0xcb0/0xcb0 [ 299.859319][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 299.865023][ C1] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 299.871067][ C1] hrtimer_interrupt+0x314/0x770 [ 299.876517][ C1] smp_apic_timer_interrupt+0x160/0x610 [ 299.882049][ C1] apic_timer_interrupt+0xf/0x20 [ 299.887010][ C1] RIP: 0010:hhf_dequeue+0x5db/0xa20 [ 299.892188][ C1] Code: b5 14 03 00 00 48 89 df 45 01 fe 44 89 73 10 e8 bb e0 77 fd 31 ff 41 89 c6 89 c6 e8 3f 26 ac fb 45 84 f6 74 63 e8 f5 24 ac fb <48> 89 d8 48 c1 e8 03 42 80 3c 20 00 0f 85 f3 03 00 00 48 8d 7b 08 [ 299.911766][ C1] RSP: 0018:ffff8880ae908b48 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 [ 299.920168][ C1] RAX: ffff8880a9906480 RBX: ffff888091ef9538 RCX: ffffffff85c65051 [ 299.928117][ C1] RDX: 0000000000000100 RSI: ffffffff85c6505b RDI: 0000000000000001 [ 299.936064][ C1] RBP: ffff8880ae908b98 R08: ffff8880a9906480 R09: 0000000000000000 [ 299.944011][ C1] R10: fffffbfff134af8f R11: ffff8880a9906480 R12: dffffc0000000000 [ 299.952913][ C1] R13: ffff888091ef9240 R14: 0000000000000001 R15: 0000000000000000 [ 299.960870][ C1] ? apic_timer_interrupt+0xa/0x20 [ 299.965962][ C1] ? hhf_dequeue+0x5d1/0xa20 [ 299.970530][ C1] ? hhf_dequeue+0x5db/0xa20 [ 299.975097][ C1] ? hhf_dequeue+0x5db/0xa20 [ 299.979729][ C1] __qdisc_run+0x1e7/0x19d0 [ 299.984262][ C1] ? dev_queue_xmit+0x18/0x20 [ 299.988918][ C1] __dev_queue_xmit+0x16f1/0x3650 [ 299.993916][ C1] ? process_backlog+0x206/0x750 [ 299.998827][ C1] ? net_rx_action+0x4d6/0x1030 [ 300.003838][ C1] ? __do_softirq+0x262/0x98c [ 300.008490][ C1] ? do_softirq_own_stack+0x2a/0x40 [ 300.013673][ C1] ? do_softirq.part.0+0x11a/0x170 [ 300.018770][ C1] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 300.024033][ C1] ? kthread+0x361/0x430 [ 300.028289][ C1] ? quarantine_put+0x11c/0x1c0 [ 300.033125][ C1] ? trace_hardirqs_on+0x67/0x240 [ 300.038171][ C1] ? __skb_ext_put+0xd9/0x210 [ 300.042825][ C1] dev_queue_xmit+0x18/0x20 [ 300.047304][ C1] ? dev_queue_xmit+0x18/0x20 [ 300.051995][ C1] br_dev_queue_push_xmit+0x3f3/0x5c0 [ 300.057349][ C1] ? __skb_ext_del+0xb0/0x2c0 [ 300.062004][ C1] ? lock_downgrade+0x920/0x920 [ 300.066940][ C1] br_nf_dev_queue_xmit+0x34e/0x1470 [ 300.072208][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 300.077906][ C1] br_nf_post_routing+0x1502/0x1d30 [ 300.083085][ C1] ? br_nf_dev_queue_xmit+0x1470/0x1470 [ 300.088606][ C1] ? mark_held_locks+0xf0/0xf0 [ 300.093348][ C1] ? nf_bridge_update_protocol+0x1d0/0x1d0 [ 300.099607][ C1] nf_hook_slow+0xbc/0x1e0 [ 300.104010][ C1] br_forward_finish+0x215/0x400 [ 300.108923][ C1] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 300.114446][ C1] ? br_fdb_add.cold+0x8c/0x8c [ 300.119331][ C1] ? ip_vs_out+0x244/0x1700 [ 300.123813][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 300.129508][ C1] ? nf_hook_slow+0xf0/0x1e0 [ 300.134075][ C1] br_nf_hook_thresh+0x2e9/0x370 [ 300.138988][ C1] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 300.144507][ C1] ? setup_pre_routing+0x4b0/0x4b0 [ 300.149594][ C1] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 300.155114][ C1] ? br_nf_forward_finish+0x176/0xa90 [ 300.160466][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 300.166337][ C1] br_nf_forward_finish+0x66c/0xa90 [ 300.171512][ C1] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 300.177078][ C1] br_nf_forward_ip+0xc74/0x21e0 [ 300.181999][ C1] ? br_nf_forward_arp+0x1670/0x1670 [ 300.187262][ C1] ? mark_held_locks+0xf0/0xf0 [ 300.192000][ C1] ? br_nf_hook_thresh+0x370/0x370 [ 300.197096][ C1] ? __vlan_flush+0x120/0x120 [ 300.201751][ C1] nf_hook_slow+0xbc/0x1e0 [ 300.206144][ C1] __br_forward+0x393/0xb00 [ 300.210625][ C1] ? br_forward_finish+0x400/0x400 [ 300.215713][ C1] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 300.221239][ C1] deliver_clone+0x61/0xc0 [ 300.226500][ C1] br_flood+0x325/0x3d0 [ 300.230634][ C1] br_handle_frame_finish+0xb46/0x1670 [ 300.236077][ C1] ? br_handle_local_finish+0x20/0x20 [ 300.241437][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 300.247132][ C1] ? nf_hook_slow+0xf0/0x1e0 [ 300.251721][ C1] br_nf_hook_thresh+0x2e9/0x370 [ 300.256638][ C1] ? br_handle_local_finish+0x20/0x20 [ 300.261985][ C1] ? setup_pre_routing+0x4b0/0x4b0 [ 300.267072][ C1] ? br_handle_local_finish+0x20/0x20 [ 300.272451][ C1] ? nf_nat_ipv6_out+0x480/0x480 [ 300.277367][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 300.283246][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 300.289125][ C1] br_nf_pre_routing_finish_ipv6+0x6fb/0xd80 [ 300.295079][ C1] ? br_handle_local_finish+0x20/0x20 [ 300.300428][ C1] br_nf_pre_routing_ipv6+0x456/0x832 [ 300.305776][ C1] ? br_validate_ipv6+0xb80/0xb80 [ 300.310786][ C1] ? br_nf_pre_routing_finish.cold+0x124/0x124 [ 300.316916][ C1] ? br_nf_pre_routing+0x246/0x2355 [ 300.322093][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.328310][ C1] ? skb_pull_rcsum+0x155/0x300 [ 300.333142][ C1] br_nf_pre_routing+0x1743/0x2355 [ 300.338241][ C1] ? br_nf_pre_routing_finish+0x1730/0x1730 [ 300.344112][ C1] ? br_nf_pre_routing_finish+0x1730/0x1730 [ 300.349977][ C1] br_handle_frame+0x806/0x133e [ 300.354808][ C1] ? br_handle_frame_finish+0x1670/0x1670 [ 300.360509][ C1] ? kfree_skb+0x10e/0x3c0 [ 300.364911][ C1] ? br_handle_local_finish+0x20/0x20 [ 300.370270][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.376487][ C1] ? br_handle_frame_finish+0x1670/0x1670 [ 300.382185][ C1] __netif_receive_skb_core+0xfc1/0x3060 [ 300.387795][ C1] ? do_xdp_generic+0x50/0x50 [ 300.392450][ C1] ? ipv6_rcv+0x116/0x420 [ 300.396756][ C1] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 300.402201][ C1] ? ip6_rcv_finish_core.isra.0+0x560/0x560 [ 300.408128][ C1] ? __enqueue_entity+0x142/0x390 [ 300.413155][ C1] ? account_entity_enqueue+0x244/0x390 [ 300.418719][ C1] __netif_receive_skb_one_core+0xa8/0x1a0 [ 300.424512][ C1] ? __netif_receive_skb_one_core+0xa8/0x1a0 [ 300.430482][ C1] ? __kasan_check_write+0x14/0x20 [ 300.435590][ C1] ? __netif_receive_skb_core+0x3060/0x3060 [ 300.441469][ C1] ? lock_acquire+0x190/0x410 [ 300.446127][ C1] ? process_backlog+0x195/0x750 [ 300.451050][ C1] __netif_receive_skb+0x2c/0x1d0 [ 300.456054][ C1] process_backlog+0x206/0x750 [ 300.460805][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.467023][ C1] net_rx_action+0x4d6/0x1030 [ 300.471680][ C1] ? napi_complete_done+0x4b0/0x4b0 [ 300.476926][ C1] ? sched_clock+0x2e/0x50 [ 300.481323][ C1] ? ip6_finish_output2+0x106d/0x2520 [ 300.486671][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.492894][ C1] __do_softirq+0x262/0x98c [ 300.497375][ C1] ? ip6_finish_output2+0x106d/0x2520 [ 300.502723][ C1] do_softirq_own_stack+0x2a/0x40 [ 300.507808][ C1] [ 300.510727][ C1] do_softirq.part.0+0x11a/0x170 [ 300.515650][ C1] __local_bh_enable_ip+0x211/0x270 [ 300.520827][ C1] ip6_finish_output2+0x10a0/0x2520 [ 300.526005][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.532222][ C1] ? ip6_forward_finish+0x530/0x530 [ 300.537447][ C1] ? ip6_mtu+0x16f/0x460 [ 300.541673][ C1] __ip6_finish_output+0x444/0xa50 [ 300.546762][ C1] ? __ip6_finish_output+0x444/0xa50 [ 300.552026][ C1] ip6_finish_output+0x38/0x1f0 [ 300.556853][ C1] ip6_output+0x235/0x7c0 [ 300.561167][ C1] ? ip6_finish_output+0x1f0/0x1f0 [ 300.566269][ C1] ? __ip6_finish_output+0xa50/0xa50 [ 300.571529][ C1] ? icmp6_dst_alloc+0x432/0x660 [ 300.576513][ C1] mld_sendpack+0x9c7/0xea0 [ 300.581001][ C1] ? nf_hook.constprop.0+0x560/0x560 [ 300.586393][ C1] ? mld_send_initial_cr.part.0+0x102/0x160 [ 300.592275][ C1] ? __local_bh_enable_ip+0x15a/0x270 [ 300.597722][ C1] mld_send_initial_cr.part.0+0x114/0x160 [ 300.604476][ C1] ipv6_mc_dad_complete+0x1ab/0x1f0 [ 300.609655][ C1] addrconf_dad_completed+0x8ce/0xbb0 [ 300.615006][ C1] ? addrconf_rs_timer+0x680/0x680 [ 300.620102][ C1] ? addrconf_dad_work+0x76c/0x1150 [ 300.625280][ C1] ? trace_hardirqs_on+0x67/0x240 [ 300.630283][ C1] ? addrconf_dad_work+0x76c/0x1150 [ 300.635474][ C1] addrconf_dad_work+0x780/0x1150 [ 300.640477][ C1] ? addrconf_dad_work+0x780/0x1150 [ 300.645663][ C1] ? addrconf_dad_completed+0xbb0/0xbb0 [ 300.651210][ C1] ? lock_acquire+0x190/0x410 [ 300.655932][ C1] ? process_one_work+0x8c1/0x1740 [ 300.661020][ C1] ? trace_hardirqs_on+0x67/0x240 [ 300.666024][ C1] process_one_work+0x9af/0x1740 [ 300.670942][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 300.676300][ C1] ? lock_acquire+0x190/0x410 [ 300.680965][ C1] worker_thread+0x98/0xe40 [ 300.685453][ C1] kthread+0x361/0x430 [ 300.689500][ C1] ? process_one_work+0x1740/0x1740 [ 300.694673][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 300.700894][ C1] ret_from_fork+0x24/0x30