[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 64.415031][ T26] audit: type=1800 audit(1569263909.996:25): pid=8616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 64.436647][ T26] audit: type=1800 audit(1569263909.996:26): pid=8616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 64.457731][ T26] audit: type=1800 audit(1569263909.996:27): pid=8616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.47' (ECDSA) to the list of known hosts. syzkaller login: [ 77.218690][ T8768] IPVS: ftp: loaded support on port[0] = 21 [ 77.272561][ T8768] chnl_net:caif_netlink_parms(): no params data found [ 77.299939][ T8768] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.307498][ T8768] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.315405][ T8768] device bridge_slave_0 entered promiscuous mode [ 77.323468][ T8768] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.330725][ T8768] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.338435][ T8768] device bridge_slave_1 entered promiscuous mode [ 77.354957][ T8768] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.365719][ T8768] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.385470][ T8768] team0: Port device team_slave_0 added [ 77.393220][ T8768] team0: Port device team_slave_1 added [ 77.459058][ T8768] device hsr_slave_0 entered promiscuous mode [ 77.508391][ T8768] device hsr_slave_1 entered promiscuous mode [ 77.584884][ T8768] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.592305][ T8768] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.600422][ T8768] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.608595][ T8768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.642183][ T8768] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.655532][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.677477][ T3010] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.685877][ T3010] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.695062][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 77.706322][ T8768] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.717089][ T3773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.725540][ T3773] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.732753][ T3773] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.758372][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.767815][ T3010] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.774900][ T3010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.783502][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.792770][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready executing program [ 77.801299][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.809572][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.819818][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.828285][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.847319][ T8768] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.885874][ T8768] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 77.912786][ T45] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 77.920679][ T45] in_atomic(): 0, irqs_disabled(): 0, pid: 45, name: kworker/u4:2 [ 77.928936][ T45] 3 locks held by kworker/u4:2/45: [ 77.934065][ T45] #0: ffff88809bd88528 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x88b/0x1740 [ 77.944311][ T45] #1: ffff8880a9ac7dc0 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 77.955086][ T45] #2: ffff8880977a0190 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x2e/0x40 [ 77.964537][ T45] CPU: 1 PID: 45 Comm: kworker/u4:2 Not tainted 5.3.0-next-20190920 #0 [ 77.972773][ T45] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.982838][ T45] Workqueue: kstrp strp_work [ 77.987409][ T45] Call Trace: [ 77.990681][ T45] dump_stack+0x172/0x1f0 [ 77.995006][ T45] __cant_sleep.cold+0xa4/0xbc [ 77.999753][ T45] kcm_parse_func_strparser+0x54/0x200 [ 78.005216][ T45] ? memset+0x32/0x40 [ 78.009177][ T45] __strp_recv+0x5dc/0x1b80 [ 78.013688][ T45] ? __kasan_check_read+0x11/0x20 [ 78.018728][ T45] strp_recv+0xcf/0x110 [ 78.023952][ T45] tcp_read_sock+0x285/0xa00 [ 78.028535][ T45] ? strp_process+0xf0/0xf0 [ 78.033030][ T45] ? compat_tcp_getsockopt+0x80/0x80 [ 78.038309][ T45] ? mark_held_locks+0xa4/0xf0 [ 78.043159][ T45] ? __local_bh_enable_ip+0x15a/0x270 [ 78.048510][ T45] ? lock_sock_nested+0xe2/0x120 [ 78.053443][ T45] ? compat_tcp_getsockopt+0x80/0x80 [ 78.058745][ T45] strp_read_sock+0x14d/0x200 [ 78.063412][ T45] ? strp_stop+0x40/0x40 [ 78.067658][ T45] ? lock_sock_nested+0xe2/0x120 [ 78.072585][ T45] strp_work+0xe3/0x130 [ 78.076741][ T45] process_one_work+0x9af/0x1740 [ 78.081669][ T45] ? pwq_dec_nr_in_flight+0x320/0x320