[ 41.024679][ T23] audit: type=1800 audit(1575342595.695:26): pid=7927 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 41.063717][ T23] audit: type=1800 audit(1575342595.695:27): pid=7927 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 41.096982][ T23] audit: type=1800 audit(1575342595.695:28): pid=7927 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.731105][ T23] audit: type=1800 audit(1575342596.435:29): pid=7927 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.66' (ECDSA) to the list of known hosts. 2019/12/03 03:10:06 fuzzer started 2019/12/03 03:10:08 dialing manager at 10.128.0.26:38907 2019/12/03 03:10:08 syscalls: 2697 2019/12/03 03:10:08 code coverage: enabled 2019/12/03 03:10:08 comparison tracing: enabled 2019/12/03 03:10:08 extra coverage: extra coverage is not supported by the kernel 2019/12/03 03:10:08 setuid sandbox: enabled 2019/12/03 03:10:08 namespace sandbox: enabled 2019/12/03 03:10:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 03:10:08 fault injection: enabled 2019/12/03 03:10:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 03:10:08 net packet injection: enabled 2019/12/03 03:10:08 net device setup: enabled 2019/12/03 03:10:08 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/03 03:10:08 devlink PCI setup: PCI device 0000:00:10.0 is not available 03:10:09 executing program 0: unshare(0x2000400) r0 = socket(0x11, 0x80a, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000040), 0x15b4fbe4) r3 = socket(0x9, 0x4, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x2082, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) getrandom(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 03:10:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="6653070000053c07bc3376005439405cb4aed12f0000000000ae47a825d868b8e907d2d80967327dc7bbfb08999e44ca8f6c60abdb447305b359f3451c769f4aa4df928ed0401de390c95e8e228da7db41b561b675f2e9b256811b5c961f982403aad2b7761dd19641abd5ccf96bc873fe910f607b9cbbff44d587b76ec0130aa865cabffa0b1c20d56a32acd095add2126373b2ab75", 0x96}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) syzkaller login: [ 54.833256][ T8090] IPVS: ftp: loaded support on port[0] = 21 03:10:09 executing program 2: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0xfffffffffffffefa, 0xfa00, {0x20000000000002, &(0x7f00000000c0)}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000004fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000180)=""/105, 0x69}, {0x0}, {&(0x7f0000000440)=""/9, 0x9}, {&(0x7f0000000640)=""/176, 0xb0}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000800)=""/156, 0x9c}], 0x6) getpid() close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={0x0, 0x24, "d070193e8eb438523e613471c0baf748552ac44408b59678ac6b6eb51b60c8299d036c53"}, &(0x7f0000000980)=0x2c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000009c0)={r2}, 0x8) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x1bfe00, 0x0) [ 54.967583][ T8092] IPVS: ftp: loaded support on port[0] = 21 [ 54.992722][ T8090] chnl_net:caif_netlink_parms(): no params data found [ 55.118914][ T8090] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.128333][ T8090] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.137514][ T8090] device bridge_slave_0 entered promiscuous mode [ 55.152203][ T8096] IPVS: ftp: loaded support on port[0] = 21 [ 55.169821][ T8090] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.181222][ T8090] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.190387][ T8090] device bridge_slave_1 entered promiscuous mode 03:10:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "9ff960", "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"}}, 0x110) [ 55.263426][ T8090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.276214][ T8090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.358502][ T8092] chnl_net:caif_netlink_parms(): no params data found [ 55.378623][ T8090] team0: Port device team_slave_0 added [ 55.397540][ T8090] team0: Port device team_slave_1 added 03:10:10 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0xff0b, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="7f000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x7a, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) [ 55.497389][ T8090] device hsr_slave_0 entered promiscuous mode [ 55.544815][ T8090] device hsr_slave_1 entered promiscuous mode [ 55.638381][ T8099] IPVS: ftp: loaded support on port[0] = 21 [ 55.701289][ T8092] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.701318][ T8092] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.735218][ T8092] device bridge_slave_0 entered promiscuous mode 03:10:10 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x0, 0x400) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f00000001c0)={0x69, "9fa96926c01a5b2ab1d97d0e305dcb33c63a4db65d620f4936af3ccc85236f8bc05471d5cc1b97d51c1b7104c6c59f0536e0a5f63c8f46de322894d1324938944a7cc6cc1294b698712667cb4000b29ccee64f35f90ada62634f68d0b5ed1b045735630c6624e11583"}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000840), 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x5, 0x8, 0x3fb, 0x401, 0x3d0, 0x1, 0x2, [], r2, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) r3 = socket$inet6(0xa, 0x803, 0x3) timer_create(0x6, &(0x7f0000000380)={0x0, 0x20, 0x1, @thr={&(0x7f0000000240)="9dd99cd7e226ceaaa6a93d295bf211d00c3951e2cc36d9c807b19a37c2ed85c3401c3c818047995b7cb470033089214d6935386949a791f96ac2c0f12c5d342e1eb83053848ab83ae5db5e", &(0x7f00000002c0)="ae3c899c9132f9c5b71fdd0a328ce97c97280ef790a6d64e400a33cf85bb6bd44f0d75ab96b3009a056a82e52c421d3487234257c8d8c351350c307c11af0713f7f5aa4a63a5ea31531732924b2ba0b45c5314f18d52b2bbc99a1c4ea9a0351a577e5771e41b8e4737195c1236a1b75c942aea4fa2e36eac0da1400b8b1e13fb03b5d54fa6f22bd59b8e66baf2"}}, &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 55.754507][ T8092] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.761618][ T8092] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.770351][ T8092] device bridge_slave_1 entered promiscuous mode [ 55.794580][ T8090] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 55.857814][ T8090] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 55.906228][ T8101] IPVS: ftp: loaded support on port[0] = 21 [ 55.920582][ T8096] chnl_net:caif_netlink_parms(): no params data found [ 55.921608][ T8104] IPVS: ftp: loaded support on port[0] = 21 [ 55.939144][ T8090] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 56.007604][ T8090] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 56.089563][ T8092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.121253][ T8092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.171149][ T8092] team0: Port device team_slave_0 added [ 56.179573][ T8092] team0: Port device team_slave_1 added [ 56.287133][ T8092] device hsr_slave_0 entered promiscuous mode [ 56.334762][ T8092] device hsr_slave_1 entered promiscuous mode [ 56.394624][ T8092] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.409740][ T8096] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.417357][ T8096] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.425706][ T8096] device bridge_slave_0 entered promiscuous mode [ 56.434975][ T8096] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.442056][ T8096] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.451045][ T8096] device bridge_slave_1 entered promiscuous mode [ 56.480696][ T8096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.492200][ T8096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.520916][ T8096] team0: Port device team_slave_0 added [ 56.534597][ T8096] team0: Port device team_slave_1 added [ 56.627340][ T8096] device hsr_slave_0 entered promiscuous mode [ 56.665109][ T8096] device hsr_slave_1 entered promiscuous mode [ 56.744569][ T8096] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.788468][ T8092] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 56.857308][ T8092] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 56.916457][ T8099] chnl_net:caif_netlink_parms(): no params data found [ 56.926007][ T8104] chnl_net:caif_netlink_parms(): no params data found [ 56.962027][ T8092] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 57.009804][ T8092] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 57.065918][ T8101] chnl_net:caif_netlink_parms(): no params data found [ 57.078557][ T8099] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.086494][ T8099] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.094026][ T8099] device bridge_slave_0 entered promiscuous mode [ 57.105576][ T8099] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.112622][ T8099] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.120500][ T8099] device bridge_slave_1 entered promiscuous mode [ 57.157378][ T8099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.187706][ T8099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.216031][ T8104] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.224818][ T8104] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.232394][ T8104] device bridge_slave_0 entered promiscuous mode [ 57.240511][ T8104] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.247618][ T8104] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.255845][ T8104] device bridge_slave_1 entered promiscuous mode [ 57.262632][ T8096] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 57.321033][ T8096] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 57.380065][ T8090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.392365][ T8101] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.400900][ T8101] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.409434][ T8101] device bridge_slave_0 entered promiscuous mode [ 57.423754][ T8099] team0: Port device team_slave_0 added [ 57.430032][ T8096] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 57.486497][ T8096] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 57.531595][ T8101] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.539084][ T8101] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.547059][ T8101] device bridge_slave_1 entered promiscuous mode [ 57.554937][ T8099] team0: Port device team_slave_1 added [ 57.570428][ T8090] 8021q: adding VLAN 0 to HW filter on device team0 [ 57.584914][ T8104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.608934][ T8101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.620312][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.628766][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.636700][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.645494][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.654210][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.661375][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.680756][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.695387][ T8104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.707456][ T8101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.729171][ T8101] team0: Port device team_slave_0 added [ 57.736722][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.746023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.754636][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.761666][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.827539][ T8099] device hsr_slave_0 entered promiscuous mode [ 57.894846][ T8099] device hsr_slave_1 entered promiscuous mode [ 57.944611][ T8099] debugfs: Directory 'hsr0' with parent '/' already present! [ 57.964309][ T8104] team0: Port device team_slave_0 added [ 57.971440][ T8101] team0: Port device team_slave_1 added [ 57.990637][ T8104] team0: Port device team_slave_1 added [ 58.005884][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.052331][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.061355][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.072742][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.081020][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.089873][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.098300][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.156527][ T8101] device hsr_slave_0 entered promiscuous mode [ 58.204855][ T8101] device hsr_slave_1 entered promiscuous mode [ 58.244623][ T8101] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.253576][ T8099] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 58.310257][ T8099] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 58.371820][ T8099] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 58.426704][ T8099] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 58.527338][ T8104] device hsr_slave_0 entered promiscuous mode [ 58.565593][ T8104] device hsr_slave_1 entered promiscuous mode [ 58.604569][ T8104] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.619862][ T8090] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 58.632331][ T8090] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.660308][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.669622][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.678652][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 58.687237][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.698490][ T8092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.723497][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.736310][ T8101] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 58.787310][ T8101] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 58.847660][ T8104] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 58.897261][ T8104] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 58.966688][ T8104] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 59.022606][ T8092] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.031025][ T8101] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 59.079901][ T8090] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.089964][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 59.097579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.105206][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.112831][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.125638][ T8104] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 59.180869][ T8101] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 59.252860][ T8096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.284012][ T8099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.298144][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.308455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.318634][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.325828][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.338511][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.347170][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.355590][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.362638][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.370191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.379050][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.397912][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.407157][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.415624][ T8094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.443228][ T8096] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.466161][ T8099] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.504436][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 164.511213][ C0] rcu: 0-...!: (1 GPs behind) idle=93e/1/0x4000000000000002 softirq=11470/11471 fqs=39 [ 164.521161][ C0] (t=10500 jiffies g=6157 q=193) [ 164.526173][ C0] rcu: rcu_preempt kthread starved for 10421 jiffies! g6157 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 164.537252][ C0] rcu: RCU grace-period kthread stack dump: [ 164.543124][ C0] rcu_preempt R running task 28864 10 2 0x80004000 [ 164.551008][ C0] Call Trace: [ 164.554291][ C0] __schedule+0x9a0/0xcc0 [ 164.558615][ C0] schedule+0x181/0x210 [ 164.562755][ C0] schedule_timeout+0x14f/0x240 [ 164.567592][ C0] ? run_local_timers+0x120/0x120 [ 164.572608][ C0] rcu_gp_kthread+0xed8/0x1770 [ 164.577368][ C0] kthread+0x332/0x350 [ 164.581419][ C0] ? rcu_report_qs_rsp+0x140/0x140 [ 164.586514][ C0] ? kthread_blkcg+0xe0/0xe0 [ 164.591091][ C0] ret_from_fork+0x24/0x30 [ 164.595505][ C0] NMI backtrace for cpu 0 [ 164.599821][ C0] CPU: 0 PID: 8092 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 164.608039][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.618077][ C0] Call Trace: [ 164.621346][ C0] [ 164.624184][ C0] dump_stack+0x1fb/0x318 [ 164.628501][ C0] nmi_cpu_backtrace+0xaf/0x1a0 [ 164.633337][ C0] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 164.639478][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 164.645527][ C0] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 164.651495][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 164.657371][ C0] rcu_dump_cpu_stacks+0x15a/0x220 [ 164.662474][ C0] rcu_sched_clock_irq+0xe25/0x1ad0 [ 164.667662][ C0] ? trace_hardirqs_off+0x74/0x80 [ 164.672681][ C0] update_process_times+0x12d/0x180 [ 164.677871][ C0] tick_sched_timer+0x263/0x420 [ 164.682707][ C0] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 164.688240][ C0] __hrtimer_run_queues+0x403/0x840 [ 164.693437][ C0] hrtimer_interrupt+0x38c/0xda0 [ 164.698378][ C0] ? debug_smp_processor_id+0x9/0x20 [ 164.703658][ C0] smp_apic_timer_interrupt+0x109/0x280 [ 164.709191][ C0] apic_timer_interrupt+0xf/0x20 [ 164.714107][ C0] [ 164.717034][ C0] RIP: 0010:free_thread_stack+0x13d/0x590 [ 164.722736][ C0] Code: 00 00 e8 06 a2 60 00 e9 5d 04 00 00 e8 5c 2d 2e 00 48 89 df 31 f6 e8 42 af 6e 00 43 80 3c 2e 00 74 08 4c 89 e7 e8 43 a4 69 00 <49> 8b 1c 24 48 83 c3 08 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 164.742323][ C0] RSP: 0018:ffffc90002507b38 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 164.750715][ C0] RAX: 0000000000000001 RBX: ffffea00027f8ec0 RCX: 0000000000000000 [ 164.758690][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea00027f8ec0 [ 164.766649][ C0] RBP: ffffc90002507b70 R08: 000000000003a768 R09: ffffed10135f1b17 [ 164.774606][ C0] R10: ffffed10135f1b17 R11: 0000000000000000 R12: ffff8880a904f9a0 [ 164.782566][ C0] R13: dffffc0000000000 R14: 1ffff11015209f34 R15: ffff88809af8d8a8 [ 164.790540][ C0] ? free_thread_stack+0x12e/0x590 [ 164.795638][ C0] put_task_stack+0xa3/0x130 [ 164.800213][ C0] finish_task_switch+0x3f1/0x550 [ 164.805233][ C0] __schedule+0x9a8/0xcc0 [ 164.809559][ C0] preempt_schedule_irq+0xc1/0x140 [ 164.814653][ C0] retint_kernel+0x1b/0x2b [ 164.819063][ C0] RIP: 0010:security_d_instantiate+0x95/0x100 [ 164.825110][ C0] Code: f8 06 48 85 db 75 13 e8 e9 17 2f fe eb 4f 0f 1f 80 00 00 00 00 e8 db 17 2f fe 48 8d 7b 18 48 89 f8 48 c1 e8 03 42 80 3c 20 00 <74> 05 e8 c4 8e 6a fe 4c 89 f7 4c 89 fe ff 53 18 48 89 d8 48 c1 e8 [ 164.844810][ C0] RSP: 0018:ffffc90002507d88 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 164.853208][ C0] RAX: 1ffffffff123d99b RBX: ffffffff891eccc0 RCX: ffff88809ee804c0 [ 164.861164][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff891eccd8 [ 164.869133][ C0] RBP: ffffc90002507db0 R08: ffffffff834783f5 R09: ffff8880925b19d0 [ 164.877099][ C0] R10: ffffed10124b633c R11: 0000000000000000 R12: dffffc0000000000 [ 164.885056][ C0] R13: 0000000000000000 R14: ffff8880925b18c0 R15: ffff8880a5363ac0 [ 164.893028][ C0] ? security_d_instantiate+0x55/0x100 [ 164.898478][ C0] ? security_d_instantiate+0x5f/0x100 [ 164.903924][ C0] d_instantiate+0x55/0x90 [ 164.908333][ C0] alloc_file_pseudo+0x1c4/0x260 [ 164.913271][ C0] sock_alloc_file+0xbb/0x260 [ 164.917936][ C0] __sys_socket+0x14b/0x2e0 [ 164.922427][ C0] __x64_sys_socket+0x7a/0x90 [ 164.927091][ C0] do_syscall_64+0xf7/0x1c0 [ 164.931585][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.937462][ C0] RIP: 0033:0x45d1c7 [ 164.941341][ C0] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4a 8b fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2d 8b fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 164.960951][ C0] RSP: 002b:00007ffd9b0e4ae8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 164.969354][ C0] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045d1c7 [ 164.977312][ C0] RDX: 0000000000000000 RSI: 0000000000080002 RDI: 0000000000000001 [ 164.985269][ C0] RBP: 00000000004bfbf5 R08: 00007ffd9b0e4b73 R09: 000000000000000f [ 164.993298][ C0] R10: 0000000000000004 R11: 0000000000000202 R12: 0000000000000003 [ 165.001254][ C0] R13: 0000000000000006 R14: 0000000000000000 R15: 00007ffd9b0e4e60