[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 42.944789][ T25] audit: type=1800 audit(1575374037.066:25): pid=8019 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 42.964555][ T25] audit: type=1800 audit(1575374037.066:26): pid=8019 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 42.984131][ T25] audit: type=1800 audit(1575374037.076:27): pid=8019 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.154' (ECDSA) to the list of known hosts. 2019/12/03 11:54:08 fuzzer started 2019/12/03 11:54:10 dialing manager at 10.128.0.26:45711 2019/12/03 11:54:10 syscalls: 2689 2019/12/03 11:54:10 code coverage: enabled 2019/12/03 11:54:10 comparison tracing: enabled 2019/12/03 11:54:10 extra coverage: extra coverage is not supported by the kernel 2019/12/03 11:54:10 setuid sandbox: enabled 2019/12/03 11:54:10 namespace sandbox: enabled 2019/12/03 11:54:10 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 11:54:10 fault injection: enabled 2019/12/03 11:54:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 11:54:10 net packet injection: enabled 2019/12/03 11:54:10 net device setup: enabled 2019/12/03 11:54:10 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/03 11:54:10 devlink PCI setup: PCI device 0000:00:10.0 is not available 11:54:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x2f8}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000240)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:54:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xf22e9877c2fc3afd}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl(r0, 0xffffffffffffffc6, &(0x7f0000000040)) syzkaller login: [ 57.340179][ T8183] IPVS: ftp: loaded support on port[0] = 21 [ 57.455836][ T8183] chnl_net:caif_netlink_parms(): no params data found 11:54:11 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_xen(&(0x7f0000000500)='keyr', &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='9p\x00', 0x0, 0x0) [ 57.540048][ T8183] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.548830][ T8186] IPVS: ftp: loaded support on port[0] = 21 [ 57.555912][ T8183] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.568720][ T8183] device bridge_slave_0 entered promiscuous mode [ 57.594463][ T8183] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.602431][ T8183] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.612548][ T8183] device bridge_slave_1 entered promiscuous mode [ 57.665823][ T8183] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.691578][ T8183] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.773757][ T8183] team0: Port device team_slave_0 added [ 57.795692][ T8186] chnl_net:caif_netlink_parms(): no params data found [ 57.813583][ T8183] team0: Port device team_slave_1 added 11:54:11 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000080)=0x10000000002) syz_open_pts(0xffffffffffffffff, 0x0) socket$isdn_base(0x22, 0x3, 0x0) process_vm_writev(0x0, &(0x7f0000c22000)=[{0x0}], 0x1, &(0x7f0000c22fa0), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000001c0)) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)=[{&(0x7f0000000600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000680)="edeb45a6f7243ea5942b31ca24ee3be5171194a8906847cc7a828998c9d891ac87d53b1ac1d1653e2cfa25ebeff6ee329fe25becc79ebb58", 0x38}, {&(0x7f00000002c0)}, {&(0x7f0000000700)="821cbca9a9a50fe2b5f7dd2f9fda162ecdd9509fc2dab0f8859580a21fd497", 0x1f}, {&(0x7f0000000740)="6b2fdeeaea0d18f4cfb62b4e908f367f684e3e25d3dad878224b", 0x1a}], 0x4, &(0x7f00000008c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90, 0x4000000}, {&(0x7f00000009c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000a40)="b2aee10efaa7425efbf124b583d6fb143c5304c5722814b903", 0x19}], 0x1, &(0x7f0000000dc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r5, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff]}}], 0x90, 0xbfecbd20c6d21766}], 0x2, 0x2) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 0xee01, 0x80}, 0xa99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}) socket$pptp(0x18, 0x1, 0x2) open(0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)={0x198, 0x32, 0x20, 0x70bd27, 0x25dfdbff, "", [@nested={0x188, 0x92, [@generic="c0a8c54417b6eeda5f6c07025318dff43a04c763b66f89789b33556914d407685f08d406162bf2e9226fb301707103170cd5d825d694b46ab459197732dd4dbc8d86cdae03bd4f4d169c7a8c3aabc050818ea22ef11105a59162d2f0fd7a195f825dddf8b62cf70559ac237a5311c457e33fc02b95f7ba9586e10768b58b1f490b3ae8a6c573a4c7e15829ed7b01367db269a6ec1e3635871f31f3c76f588256839969761448c9de4876504735e0893ed8ad726695b1c9a201af86977c6072bcd05edb645c287ae716181985497b7fdb6b2da5faba6d4622e9", @typed={0x8, 0x63, @fd}, @typed={0x8, 0x2a, @pid=r4}, @generic="f8733e50cb4b34d1a47b6c30e024741a09cc153398dd2066552d41d764571c5e861c9e73573dd6483269a18d159d98028dfd3c4fa236589dceca14882f8bc8e2ad4f99cec6a365ba1632d673f43f69fda245e0f57a4f17e9ea7dc20d548ce127dec4cdc47891219f5090c922fda106d6023925db3f4363a4efa2fe42577a2b642fdbb72f4b162c8eba30f7dfe264447cdb9b0320e28f86eb8ff9"]}]}, 0x198}], 0x1, &(0x7f0000000580)=[@cred={{0x1c, 0x1, 0x2, {r0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60, 0x2800}, 0x4010400) [ 57.845638][ T8189] IPVS: ftp: loaded support on port[0] = 21 11:54:12 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x8, 0x0, 0x0) [ 57.983545][ T8183] device hsr_slave_0 entered promiscuous mode [ 58.020236][ T8183] device hsr_slave_1 entered promiscuous mode [ 58.071543][ T8186] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.078646][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.099903][ T8186] device bridge_slave_0 entered promiscuous mode [ 58.119851][ T8186] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.126926][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.149843][ T8186] device bridge_slave_1 entered promiscuous mode [ 58.201110][ T8186] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.203114][ T8191] IPVS: ftp: loaded support on port[0] = 21 [ 58.234623][ T8186] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.294508][ T8193] IPVS: ftp: loaded support on port[0] = 21 [ 58.314479][ T8183] netdevsim netdevsim0 netdevsim0: renamed from eth0 11:54:12 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x15, 0x0, 0xb}) [ 58.354312][ T8186] team0: Port device team_slave_0 added [ 58.366439][ T8186] team0: Port device team_slave_1 added [ 58.378595][ T8183] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 58.461593][ T8183] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 58.532872][ T8183] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 58.602255][ T8189] chnl_net:caif_netlink_parms(): no params data found [ 58.614459][ T8196] IPVS: ftp: loaded support on port[0] = 21 [ 58.666952][ T8189] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.674330][ T8189] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.682031][ T8189] device bridge_slave_0 entered promiscuous mode [ 58.731726][ T8186] device hsr_slave_0 entered promiscuous mode [ 58.769496][ T8186] device hsr_slave_1 entered promiscuous mode [ 58.819138][ T8186] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.837069][ T8189] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.845075][ T8189] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.853228][ T8189] device bridge_slave_1 entered promiscuous mode [ 58.887192][ T8189] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.915205][ T8189] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.938098][ T8189] team0: Port device team_slave_0 added [ 58.945995][ T8189] team0: Port device team_slave_1 added [ 59.051104][ T8189] device hsr_slave_0 entered promiscuous mode [ 59.089317][ T8189] device hsr_slave_1 entered promiscuous mode [ 59.139145][ T8189] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.157274][ T8186] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 59.221985][ T8186] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 59.327494][ T8191] chnl_net:caif_netlink_parms(): no params data found [ 59.339035][ T8186] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 59.401010][ T8186] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 59.460663][ T8191] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.467963][ T8191] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.477649][ T8191] device bridge_slave_0 entered promiscuous mode [ 59.504101][ T8189] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 59.573251][ T8191] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.581161][ T8191] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.588811][ T8191] device bridge_slave_1 entered promiscuous mode [ 59.610792][ T8189] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 59.662832][ T8189] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 59.722021][ T8193] chnl_net:caif_netlink_parms(): no params data found [ 59.737745][ T8196] chnl_net:caif_netlink_parms(): no params data found [ 59.751641][ T8189] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 59.823002][ T8183] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.847571][ T8191] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.868535][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.877153][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.894391][ T8183] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.902623][ T8191] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.931416][ T8191] team0: Port device team_slave_0 added [ 59.937358][ T8193] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.944899][ T8193] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.953459][ T8193] device bridge_slave_0 entered promiscuous mode [ 59.972175][ T8196] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.979462][ T8196] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.987227][ T8196] device bridge_slave_0 entered promiscuous mode [ 59.995586][ T8196] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.003232][ T8196] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.011158][ T8196] device bridge_slave_1 entered promiscuous mode [ 60.019292][ T8191] team0: Port device team_slave_1 added [ 60.026167][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.035182][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.043941][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.051251][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.059524][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.068179][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.076605][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.083693][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.091322][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.100129][ T8193] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.107192][ T8193] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.116494][ T8193] device bridge_slave_1 entered promiscuous mode [ 60.138475][ T8186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.156334][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.172832][ T8193] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.187612][ T8193] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.206470][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.215274][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.224683][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.233648][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.243274][ T8196] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.255530][ T8196] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.275249][ T8196] team0: Port device team_slave_0 added [ 60.287515][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.296375][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.360715][ T8191] device hsr_slave_0 entered promiscuous mode [ 60.409545][ T8191] device hsr_slave_1 entered promiscuous mode [ 60.469202][ T8191] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.480322][ T8196] team0: Port device team_slave_1 added [ 60.496022][ T8193] team0: Port device team_slave_0 added [ 60.503635][ T8193] team0: Port device team_slave_1 added [ 60.512440][ T8186] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.535118][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.543817][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.591977][ T8196] device hsr_slave_0 entered promiscuous mode [ 60.649389][ T8196] device hsr_slave_1 entered promiscuous mode [ 60.689563][ T8196] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.698636][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.707067][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.716688][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.725290][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.734083][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.741189][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.748800][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.757426][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.765816][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.772967][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.793678][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.801786][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.810265][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.821798][ T8183] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.882637][ T8193] device hsr_slave_0 entered promiscuous mode [ 60.920177][ T8193] device hsr_slave_1 entered promiscuous mode [ 60.959345][ T8193] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.975172][ T8183] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.987947][ T8198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.997424][ T8198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.006031][ T8198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.014440][ T8198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.032523][ T8191] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 61.085953][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.097315][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.117952][ T8189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.125826][ T8191] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 61.188708][ T8198] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.197217][ T8198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.206068][ T8198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.225868][ T8191] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 61.251652][ T8205] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 166.368923][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 166.375670][ C0] rcu: 0-....: (1 GPs behind) idle=c12/1/0x4000000000000002 softirq=10025/10026 fqs=5202 [ 166.385918][ C0] (t=10500 jiffies g=6245 q=215) [ 166.390953][ C0] NMI backtrace for cpu 0 [ 166.395272][ C0] CPU: 0 PID: 219 Comm: kworker/u4:3 Not tainted 5.4.0-syzkaller #0 [ 166.403282][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.413336][ C0] Workqueue: events_unbound fsnotify_connector_destroy_workfn [ 166.420763][ C0] Call Trace: [ 166.424029][ C0] [ 166.426866][ C0] dump_stack+0x1fb/0x318 [ 166.431170][ C0] nmi_cpu_backtrace+0xaf/0x1a0 [ 166.436008][ C0] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 166.442154][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 166.448210][ C0] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 166.454164][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 166.460030][ C0] rcu_dump_cpu_stacks+0x15a/0x220 [ 166.465130][ C0] rcu_sched_clock_irq+0xe25/0x1ad0 [ 166.470306][ C0] ? trace_hardirqs_off+0x74/0x80 [ 166.475304][ C0] update_process_times+0x12d/0x180 [ 166.480491][ C0] tick_sched_timer+0x263/0x420 [ 166.485328][ C0] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 166.490864][ C0] __hrtimer_run_queues+0x403/0x840 [ 166.496142][ C0] hrtimer_interrupt+0x38c/0xda0 [ 166.501065][ C0] ? debug_smp_processor_id+0x9/0x20 [ 166.506327][ C0] smp_apic_timer_interrupt+0x109/0x280 [ 166.511845][ C0] apic_timer_interrupt+0xf/0x20 [ 166.516756][ C0] [ 166.519674][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x50 [ 166.525724][ C0] Code: 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 53 48 89 fb e8 13 00 00 00 48 8b 3d 74 25 cd 07 48 89 de e8 64 02 3b 00 5b 5d c3 cc <48> 8b 04 24 65 48 8b 0c 25 c0 1d 02 00 65 8b 15 b8 81 8b 7e f7 c2 [ 166.545570][ C0] RSP: 0018:ffffc90001967900 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 166.553967][ C0] RAX: 1ffff11014d42a01 RBX: ffffea00028ef200 RCX: ffff8880a91fe180 [ 166.562013][ C0] RDX: 0000000000000000 RSI: 00000000fffffffc RDI: ffffea00028ef200 [ 166.569960][ C0] RBP: ffffc90001967940 R08: 000000000003a768 R09: ffffed10144b7b17 [ 166.577928][ C0] R10: ffffed10144b7b17 R11: 0000000000000000 R12: ffff8880a6a150a0 [ 166.585977][ C0] R13: dffffc0000000000 R14: 1ffff11014d42a14 R15: ffff8880a25bd8a8 [ 166.593938][ C0] ? free_thread_stack+0x124/0x590 [ 166.599023][ C0] put_task_stack+0xa3/0x130 [ 166.603589][ C0] finish_task_switch+0x3f1/0x550 [ 166.608602][ C0] __schedule+0x9a8/0xcc0 [ 166.612910][ C0] ? ___preempt_schedule+0x16/0x18 [ 166.617996][ C0] preempt_schedule+0xdb/0x120 [ 166.622736][ C0] ___preempt_schedule+0x16/0x18 [ 166.627670][ C0] _raw_spin_unlock_irqrestore+0xcc/0xe0 [ 166.633277][ C0] __call_srcu+0x7ab/0xb00 [ 166.637686][ C0] __synchronize_srcu+0x1cf/0x260 [ 166.642904][ C0] ? rcu_read_lock_any_held+0x1a0/0x1a0 [ 166.648427][ C0] synchronize_srcu+0x2cb/0x2f0 [ 166.653263][ C0] fsnotify_connector_destroy_workfn+0x44/0xb0 [ 166.659409][ C0] process_one_work+0x7ef/0x10d0 [ 166.664348][ C0] worker_thread+0xc01/0x1630 [ 166.669024][ C0] kthread+0x332/0x350 [ 166.673091][ C0] ? rcu_lock_release+0x30/0x30 [ 166.677928][ C0] ? kthread_blkcg+0xe0/0xe0 [ 166.682492][ C0] ret_from_fork+0x24/0x30