[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 29.179952] kauditd_printk_skb: 8 callbacks suppressed [ 29.179964] audit: type=1800 audit(1544597231.932:29): pid=5886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 29.213562] audit: type=1800 audit(1544597231.932:30): pid=5886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 34.009962] sshd (6026) used greatest stack depth: 15600 bytes left Warning: Permanently added '10.128.0.152' (ECDSA) to the list of known hosts. 2018/12/12 06:47:23 fuzzer started 2018/12/12 06:47:25 dialing manager at 10.128.0.26:34565 2018/12/12 06:47:26 syscalls: 1 2018/12/12 06:47:26 code coverage: enabled 2018/12/12 06:47:26 comparison tracing: enabled 2018/12/12 06:47:26 setuid sandbox: enabled 2018/12/12 06:47:26 namespace sandbox: enabled 2018/12/12 06:47:26 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/12 06:47:26 fault injection: enabled 2018/12/12 06:47:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/12 06:47:26 net packet injection: enabled 2018/12/12 06:47:26 net device setup: enabled 06:51:27 executing program 0: [ 284.664493] IPVS: ftp: loaded support on port[0] = 21 06:51:27 executing program 1: [ 284.948622] IPVS: ftp: loaded support on port[0] = 21 06:51:27 executing program 2: [ 285.279635] IPVS: ftp: loaded support on port[0] = 21 06:51:28 executing program 3: [ 285.781202] IPVS: ftp: loaded support on port[0] = 21 06:51:28 executing program 4: rt_sigpending(&(0x7f0000000000), 0x8) r0 = socket$vsock_stream(0x28, 0x1, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "fad0df52"}, 0x5, 0x1) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x20) write$UHID_INPUT2(r1, &(0x7f0000000100)={0xc, 0xf3, "d08d39f46fb8a964bbbe3225073b33f3981fb0c768351d30d117b7b61e4886258eae2a298ab04b42b29e500f6988ae01e9a85427393c2ef74b1e5c5763b41b34bb9139388b035fa8cafba2db45188a8d10e1d9acc93ae1ba646f1d609f53b3088f01f3fbb8e360456135b05b3fac0539b53b61a50cf97940094b3c4373bca981fadfa80a25cd309dd39817abced5126b25a292c1bed2b446edb520f0b0817dd8da6a024d87c61f1664cfa3c41812ca213d8de36ffc6258bffba217a309a34def3e7682d7cb3db09bf91f36d2fa6048e88a671b9ee13d06bbe280321578cd7b32e459c373bbffe925bb3f184f74095bf39b7c3a"}, 0xf9) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000240)={r2, 0x2}) r3 = openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f00000002c0)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) setsockopt(r1, 0x1115, 0xffffffffffffe595, &(0x7f0000000300)="5112b713517708dfaf13b14abc908497042e171cb8fc787361df2b8b60e118983b7fd6cf9d42ee180b2a09a7fca98787f92ef63a92ed4425dcc5a47c55b130c80350c45bbf0347bedcd92de9e8e410e3a36eefa797286d9c0476a03ca7da", 0x5e) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) fcntl$setlease(r3, 0x400, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x802, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f00000003c0)={0x1, 0x3, 0x8, 0xfffffffffffffffa}) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000400)={'ifb0\x00', 0x3d5}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0xbe7) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x42000, 0x0) getsockopt$inet6_buf(r4, 0x29, 0xcd, &(0x7f0000000480)=""/168, &(0x7f0000000540)=0xa8) lremovexattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00') getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0xfffffffffffffbff) setns(r5, 0x18000000) r6 = syz_open_pts(r5, 0x2) writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000680)="c186a7e795d522c1f3af6112d1f89ed0c61cb837a687e666be5479374903e70bedcd1406cfc148522e213835b122b8a686d5a0e275eb2f2d2a569bd81c2a8a018ab74f651a343ce2051d9fa11cdcf9f2073ff2683ee0bbb8c634ea4d6df3099a6b6a23a166083e393d75d902e136e3b793b896a18b32c98fac441445adf266e7f2bfd4e0a6a7725579b5b568c4effdaad594339b1346161109227cf2e8656dcd8159ee80b23f220737612c553cbb0a4cbd8368ca75172f982a2d25fdbb667109dda1a3471f6524e0f4c42fd3f04ce8", 0xcf}, {&(0x7f0000000780)="c868065788e391dac7cda00bd6033899e60ed88381f518a7597c7bd35942797dbf6023f639bc2d06e55aff9f7cf127bea15dfd0e233a90ce618e5d7e186f45efa51d71b13aceaad62d1ccdd67af98857fe952dcb2df930d5c7d4d7686c5ac20387872d57871cb99b6f6842be2730d3b2533455a5ee3f3ce5b5ecebd43edb789296fe79cb7ef9738ab4a4d033f8b2ef80b354476a6b1c9adecd25cc43c2a7dc5a832ecc6fb03be3c4fcd230d87175a5d7de", 0xb1}, {&(0x7f0000000840)="af1e41dd0c1796724e26eb3a7db0bad4915b39899859d7b39694d342303811b383beeb74b6c23248ef1d8bb3a2961f98", 0x30}, {&(0x7f0000000880)="374e678010ee7e81295e3f5458be39f7347a7257a8e0f1d3720b0746b734589b7de014abcdf1dff368ad64b0424d3f3ae1306c7c9bd8e804032b36805f3d094803e1c6ff0272c646744f1177a95745a49d", 0x51}, {&(0x7f0000000900)="a6255f99ccc563783ab5f82bed3dd6aab3322e3e8ebf2aabf5f92c0c0f5b9a11930858fe16fe6d9d5568a16e538d27731af7c45de30f2f4cdf299b669760a07a27302778df315d4709c80bc16a099ba50fa3ff62207a2bd49b8d72a9d49d859c6e03becea7b759dc2ed0297013161728b44fb074f16052f014c2de5c1cfaadf5e87ef74b45ba535d965dda75dcb628422073d8dd3aa098e5f7b69678d92bb535d0a69ed3c5ab6f18cc6c49f2d6c124b63ce25a88af55089f5ed207032b39309d63c8813718caea721de76a7d0c7a2765", 0xd0}, {&(0x7f0000000a00)="b1a853b1aeb90dad0e50e6a403a877c7732703c0aac6535661b7d319d2ea685941f283de76a266746a74591e820a4f2f4aae3fc429a6418173c99b994341af02013c14e5c99d1aaabc5bc02d23924697df07f6c58134d98b07d4ddfca5e79640f1e524d7f11e4a8049c7cf09fbcd5d70421c443226859c57a14cf26040f71858e51a3c2f6b6a4458da22f96719bd7ee9ef073decdd0f6a3748d6f16a5b16678b16cd3ce424092701ff38e8ed7f950e12b4fc788eaa78307b7acc843c6c1d1851aa9e7a0ff84cd59ac02ac8a1fc80fceb6b74", 0xd2}, {&(0x7f0000000b00)="63f02a212c7dfbe82d83951e861af2d983e80628c0fc8e6879e3bfb40bdd21785099b6cc00fd69090ed96d59158a311a213c294889241099b3e37b0d2e590d8640144737a7a9bd579a3c4a0aa45f14732e843fcb187a0662c108f40ce389a3774031b8ab", 0x64}], 0x7) write$P9_RXATTRWALK(r4, &(0x7f0000000c00)={0xf, 0x1f, 0x2, 0x8}, 0xf) write$UHID_CREATE(r5, &(0x7f0000000d00)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000c40)=""/166, 0xa6, 0x5b92, 0x4, 0x0, 0x7fffffff, 0xc0e}, 0x120) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000e80)={0x1, 0x0, [{0x5000, 0x0, &(0x7f0000000e40)}]}) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000ec0)) ioctl$TIOCCBRK(r6, 0x5428) [ 286.313975] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.364600] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.384489] device bridge_slave_0 entered promiscuous mode [ 286.462559] IPVS: ftp: loaded support on port[0] = 21 [ 286.519872] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.531412] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.539393] device bridge_slave_1 entered promiscuous mode [ 286.668158] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 06:51:29 executing program 5: sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x800, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000080)={0x0, r1, 0x1}) r2 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x41, 0x0) r3 = dup3(r1, r2, 0xcd7de582268262a6) r4 = getuid() getgroups(0x9, &(0x7f00000001c0)=[0xee00, 0x0, 0xee00, 0xee01, 0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0x0]) r8 = geteuid() mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x824021, &(0x7f0000000200)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x20}}, {@max_read={'max_read', 0x3d, 0x6}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x3f}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x20}}, {@max_read={'max_read', 0x3d, 0x2}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x8001}}], [{@fowner_eq={'fowner', 0x3d, r8}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x65, 0x65, 0x0, 0x34, 0x7f, 0x30, 0x37], 0x2d, [0x65, 0x35, 0x35, 0x66], 0x2d, [0x63, 0x34, 0x61, 0x33], 0x2d, [0x64, 0x32, 0x77, 0x7b], 0x2d, [0x64, 0x73, 0x66, 0x36, 0x32, 0x67, 0x77, 0x3e]}}}, {@smackfshat={'smackfshat', 0x3d, ':'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '[security/vmnet1louser*eth1\\\':'}}]}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0x82, "4b9a0c4be8f2812ee124882b7002c34fec92a0c7243c8452ae4bd7495adeba3290e79500a836eb8dc98776d940a488dec097a4f8a1032a54151fa56ca0a9dd0923a3c12d8f9c4def64c5420bfd57365dc41097199d2f4f67490550d62e78bd225c576f001ece3856caf480d47ac2f3551a68f3be9df5e15ab89eab02c5bb7eeb4af1"}, &(0x7f0000000500)=0x8a) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000540)={r9, 0x3ff, 0xe0, "f2c7e71e7732ba0c6c1729aadf20dd8454dd72aaefe1d18d36f3377d17f8672511280f3f6a0594aa51d43f5fa95c2285a0eeae2f0056474a14e3edba256594805b1b09f242511f944b8da87379a0c3955c6e9e7ce4434cc2615d68678f9511ef7e405268118a89524b3fe602a5050010657ae7f2bdbd4558d73a376074b94b9de72d73f12d1bc8ab6db66f3369f83eb5278fcc2345885227a1b79407e23e542bb613ecdc019992314c1139c938bb34b99d4b2a5e14f32f12bc6b40c7337820cb968ba2f9585efcd90c442cd1655b1a2d7b8cb583fb76b144be3c4018707859fe"}, 0xe8) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000640)=""/221) prctl$PR_GET_SECUREBITS(0x1b) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000740)={r9, 0xcc, "091f379663b467f327f65f23c5f793ebba967122e4c1b3e2972d801b1a41a157b6cd8dbb2eb87b8b839f19c95868e7fc41329a31083bab6cf52f9ea57ea6e43da97d911da61c6f6806d9e0608e935ebbe96e3b15d7f26d12ebbbc33a2b25f67bb13ec88e93f36cc41dead807105bfebc95beb6bbb13a584cdbf9c624f51dc5bc14d9fe4d58b77001b4937b7df19b023254d644572fcac2f15b576f76d76f96d85a65a98567569b0235ec8af43b2569c0c2a3e831cb237b3463351b1c2314983362ba445fa020ab93cea407a9"}, &(0x7f0000000840)=0xd4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000880)={0x8, [0x3, 0x2, 0x80, 0x4, 0x9, 0x0, 0x7f, 0xfffffffffffffff8]}, &(0x7f00000008c0)=0x14) getgroups(0x3, &(0x7f0000000900)=[r7, r5, r6]) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af04, &(0x7f0000000980)=&(0x7f0000000940)) ioctl$VIDIOC_TRY_ENCODER_CMD(r3, 0xc028564e, &(0x7f00000009c0)={0x3, 0x1, [0x7, 0x0, 0xa70, 0x3f, 0x6, 0x80000001, 0x17e, 0x3f]}) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000a00)={r10, 0xa7, 0x7}, 0x8) r11 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000a40)=[@in6={0xa, 0x4e22, 0x1, @mcast1, 0x3}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0xd5e7, 0xffff, @loopback, 0xd1}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e24, @rand_addr=0x9}, @in6={0xa, 0x4e24, 0x0, @remote, 0x40}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e20, @local}], 0xa4) ioctl$FS_IOC_SETFLAGS(r11, 0x40086602, &(0x7f0000000b00)=0x51a12404) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0xffffffffffffffff, r3, 0x0, 0x1, &(0x7f0000000b40)=':', 0xffffffffffffffff}, 0x30) r13 = syz_open_procfs(r12, &(0x7f0000000bc0)='net/tcp6\x00') fcntl$setsig(r13, 0xa, 0x39) getsockopt$inet6_buf(r13, 0x29, 0x45, &(0x7f0000000c00)=""/103, &(0x7f0000000c80)=0x67) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000cc0)=r10, 0x4) syz_mount_image$jfs(&(0x7f0000000d00)='jfs\x00', &(0x7f0000000d40)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000e40)=[{&(0x7f0000000d80)="0e58dc6b1d36786c2495977cd8ef00a688351b95d24cac68dd2264d3d26ec9ebc014912c2a04fc96d2ea05eec5c940b784079d48e10f3edfccc0983645683c6d10b7d29d9e5a4e5a87503966fd9575f22989fe4dd46b1fe3852f7242158de3c25e93846822d0db0c1651ce132cf6bd982c65b37f8d72aa58b5619a4d338053fe2360554ed3ca3bb332ef5c5baa93ed6a8ea1eae1d5fb4fc54dc5b895f18f915f03724b8c2da2f88e8cb5e2edb4425aa25d8e39", 0xb3, 0x24e9}], 0x80000, &(0x7f0000000e80)={[{@gid={'gid', 0x3d, r5}}, {@nointegrity='nointegrity'}], [{@subj_type={'subj_type', 0x3d, 'smackfsfloor'}}, {@pcr={'pcr', 0x3d, 0x2}}, {@smackfshat={'smackfshat', 0x3d, '}'}}, {@uid_lt={'uid<', r8}}, {@obj_user={'obj_user', 0x3d, ':'}}]}) [ 286.811533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 286.916252] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.922696] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.936743] device bridge_slave_0 entered promiscuous mode [ 287.049276] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.065429] IPVS: ftp: loaded support on port[0] = 21 [ 287.075320] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.082884] device bridge_slave_1 entered promiscuous mode [ 287.231290] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 287.249072] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 287.353473] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 287.382022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 287.433903] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.464831] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.484722] device bridge_slave_0 entered promiscuous mode [ 287.617882] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.625459] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.632843] device bridge_slave_1 entered promiscuous mode [ 287.743179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 287.788527] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 287.863232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 287.953339] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 288.089520] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 288.105450] team0: Port device team_slave_0 added [ 288.119912] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 288.162277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 288.193881] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.203929] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.211891] device bridge_slave_0 entered promiscuous mode [ 288.228853] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 288.236809] team0: Port device team_slave_1 added [ 288.252312] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 288.341578] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.358507] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.367415] device bridge_slave_1 entered promiscuous mode [ 288.410619] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 288.441944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.487698] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 288.540287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.627932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 288.662193] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.685073] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.692529] device bridge_slave_0 entered promiscuous mode [ 288.718621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 288.735840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.761750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.777407] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 288.786303] team0: Port device team_slave_0 added [ 288.834804] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 288.841988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.851293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.884339] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.894885] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.902741] device bridge_slave_1 entered promiscuous mode [ 288.916068] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 288.923837] team0: Port device team_slave_1 added [ 289.036772] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 289.048089] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 289.061850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 289.085551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 289.150655] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 289.163789] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 289.198572] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 289.217081] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 289.225212] team0: Port device team_slave_0 added [ 289.238333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 289.255291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 289.279132] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 289.330939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 289.356290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.376881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.398308] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 289.406935] team0: Port device team_slave_1 added [ 289.480115] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 289.505156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.513193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.548997] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.563128] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.571084] device bridge_slave_0 entered promiscuous mode [ 289.587734] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 289.614852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 289.654577] list_add corruption. prev->next should be next (ffffffff8a1dca60), but was 0000000000000000. (prev=ffff8881bf427d70). [ 289.666879] ------------[ cut here ]------------ [ 289.671645] kernel BUG at lib/list_debug.c:28! [ 289.676380] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 289.681758] CPU: 1 PID: 6421 Comm: syz-executor3 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 289.689052] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 289.690257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.706881] RIP: 0010:__list_add_valid.cold.2+0x23/0x2a [ 289.707086] kobject: 'bonding_slave' (00000000802e5510): kobject_add_internal: parent: 'bond_slave_1', set: '' [ 289.712260] Code: e8 00 1f d2 fd 0f 0b 48 89 d9 48 c7 c7 20 e6 80 88 e8 ef 1e d2 fd 0f 0b 48 89 f1 48 c7 c7 a0 e6 80 88 48 89 de e8 db 1e d2 fd <0f> 0b 90 90 90 90 90 55 48 89 e5 41 57 41 56 49 be 00 00 00 00 00 [ 289.731394] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 289.741843] RSP: 0018:ffff8881dad06dc0 EFLAGS: 00010286 [ 289.741854] RAX: 0000000000000075 RBX: ffffffff8a1dca60 RCX: 0000000000000000 [ 289.741870] RDX: 0000000000000000 RSI: ffffffff816621c5 RDI: 0000000000000005 [ 289.741877] RBP: ffff8881dad06dd8 R08: ffff8881d241e2c0 R09: ffffed103b5a5020 [ 289.741885] R10: ffffed103b5a5020 R11: ffff8881dad28107 R12: ffff8881d3443db0 [ 289.741892] R13: ffff8881d3443b40 R14: ffffffff8a1dc820 R15: ffffffff8a1dcab0 [ 289.741909] FS: 0000000000000000(0000) GS:ffff8881dad00000(0000) knlGS:0000000000000000 [ 289.741917] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 289.741925] CR2: 00000000004dca5b CR3: 00000001cddd5000 CR4: 00000000001406e0 [ 289.741937] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 289.741944] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 289.741948] Call Trace: [ 289.742033] [ 289.742082] ___neigh_create+0x14b7/0x2600 [ 289.742107] ? neigh_remove_one+0x5a0/0x5a0 [ 289.756990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 289.762413] ? print_usage_bug+0xc0/0xc0 [ 289.790674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.791395] ? graph_lock+0x270/0x270 [ 289.815110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.820057] ? find_held_lock+0x36/0x1c0 [ 289.850186] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.851589] ? ipv6_chk_mcast_addr+0x350/0x940 [ 289.865202] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.869901] ? lock_downgrade+0x900/0x900 [ 289.869922] ? check_preemption_disabled+0x48/0x280 [ 289.884334] kobject: 'brport' (000000003bdab12c): kobject_add_internal: parent: 'bridge_slave_1', set: '' [ 289.884939] ? kasan_check_read+0x11/0x20 [ 289.884980] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 289.892134] device bridge_slave_1 entered promiscuous mode [ 289.895440] ? lock_acquire+0x1ed/0x520 [ 289.895513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.895534] ? check_preemption_disabled+0x48/0x280 [ 289.906434] kobject: 'brport' (000000003bdab12c): kobject_uevent_env [ 289.910769] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 289.924497] kobject: 'brport' (000000003bdab12c): kobject_uevent_env: filter function caused the event to drop! [ 289.925855] ? rcu_pm_notify+0xc0/0xc0 [ 289.925876] __neigh_create+0x30/0x40 [ 289.931657] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 289.935611] ip6_finish_output2+0xa64/0x2940 [ 289.935649] ? irq_exit+0x17f/0x1c0 [ 289.935665] ? find_held_lock+0x36/0x1c0 [ 289.935676] ? ip6_forward_finish+0x560/0x560 [ 289.935690] ? ip6_mtu+0x39c/0x520 [ 289.935704] ? lock_downgrade+0x900/0x900 [ 289.935717] ? check_preemption_disabled+0x48/0x280 [ 289.935734] ? kasan_check_read+0x11/0x20 [ 289.935752] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 289.949624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 289.952803] ? rcu_read_unlock_special+0x370/0x370 [ 289.988745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 289.989546] ? ip6_mtu+0x160/0x520 [ 289.999282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.001713] ? find_match+0x10a0/0x10a0 [ 290.035125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.038617] ? kasan_check_read+0x11/0x20 [ 290.061374] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 290.067176] ip6_finish_output+0x58c/0xc60 [ 290.067473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 290.071426] ? ip6_finish_output+0x58c/0xc60 [ 290.082967] ip6_output+0x232/0x9d0 [ 290.086614] ? ip6_finish_output+0xc60/0xc60 [ 290.091035] ? ip6_fragment+0x38b0/0x38b0 [ 290.095190] ? ip6_mtu_from_fib6+0x770/0x770 [ 290.099611] mld_sendpack+0xad5/0xfa0 [ 290.103421] ? nf_hook.constprop.40+0x860/0x860 [ 290.108159] ? _raw_read_unlock_bh+0x30/0x40 [ 290.112616] ? trace_hardirqs_off_caller+0x310/0x310 [ 290.117736] ? __local_bh_enable_ip+0x160/0x260 [ 290.122414] mld_ifc_timer_expire+0x447/0x8a0 [ 290.126963] call_timer_fn+0x272/0x920 [ 290.130869] ? mld_dad_timer_expire+0x1b0/0x1b0 [ 290.135548] ? process_timeout+0x40/0x40 [ 290.139624] ? mark_held_locks+0xc7/0x130 [ 290.143797] ? _raw_spin_unlock_irq+0x27/0x80 [ 290.148309] ? _raw_spin_unlock_irq+0x27/0x80 [ 290.152821] ? mld_dad_timer_expire+0x1b0/0x1b0 [ 290.156145] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 290.157507] ? lockdep_hardirqs_on+0x296/0x5b0 [ 290.169021] ? trace_hardirqs_on+0xbd/0x310 [ 290.173384] ? kasan_check_read+0x11/0x20 [ 290.177549] ? __run_timers+0x7da/0xc70 [ 290.181670] ? trace_hardirqs_off_caller+0x310/0x310 [ 290.186790] ? mld_dad_timer_expire+0x1b0/0x1b0 [ 290.191465] __run_timers+0x7e5/0xc70 [ 290.195272] ? timer_fixup_init+0x70/0x70 [ 290.199429] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 290.204447] ? graph_lock+0x270/0x270 [ 290.208268] ? print_usage_bug+0xc0/0xc0 [ 290.212360] ? hrtimer_update_softirq_timer+0xa0/0xa0 [ 290.217590] ? find_held_lock+0x36/0x1c0 [ 290.220812] kobject: 'veth0_to_bond' (0000000001f5e0ad): kobject_add_internal: parent: 'net', set: 'devices' [ 290.221671] ? graph_lock+0x270/0x270 [ 290.235435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.240979] ? check_preemption_disabled+0x48/0x280 [ 290.246018] ? __lock_is_held+0xb5/0x140 [ 290.250126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.255580] kobject: 'veth0_to_bond' (0000000001f5e0ad): kobject_uevent_env [ 290.255670] ? check_preemption_disabled+0x48/0x280 [ 290.262814] kobject: 'veth0_to_bond' (0000000001f5e0ad): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bond' [ 290.267802] run_timer_softirq+0x52/0xb0 [ 290.267817] ? rcu_read_lock_sched_held+0x14f/0x180 [ 290.267832] __do_softirq+0x308/0xb7e [ 290.267852] ? ktime_get_raw_ts64+0x4d0/0x4d0 [ 290.286304] kobject: 'queues' (0000000033c2a795): kobject_add_internal: parent: 'veth0_to_bond', set: '' [ 290.287585] ? lock_downgrade+0x900/0x900 [ 290.291389] kobject: 'queues' (0000000033c2a795): kobject_uevent_env [ 290.295867] ? __irqentry_text_end+0x1f9658/0x1f9658 [ 290.295987] ? pvclock_read_flags+0x160/0x160 [ 290.296054] ? lapic_next_event+0x5a/0x90 [ 290.306580] kobject: 'queues' (0000000033c2a795): kobject_uevent_env: filter function caused the event to drop! [ 290.310298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.324708] kobject: 'rx-0' (0000000071664034): kobject_add_internal: parent: 'queues', set: 'queues' [ 290.326362] ? kvm_clock_read+0x18/0x30 [ 290.330562] kobject: 'rx-0' (0000000071664034): kobject_uevent_env [ 290.340712] ? kvm_sched_clock_read+0x9/0x20 [ 290.340729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.340744] ? check_preemption_disabled+0x48/0x280 [ 290.340761] irq_exit+0x17f/0x1c0 [ 290.360097] kobject: 'rx-0' (0000000071664034): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bond/queues/rx-0' [ 290.365898] smp_apic_timer_interrupt+0x1cb/0x760 [ 290.365911] ? smp_reschedule_interrupt+0x109/0x650 [ 290.365925] ? smp_call_function_single_interrupt+0x650/0x650 [ 290.365938] ? interrupt_entry+0xb5/0xc0 [ 290.365958] ? trace_hardirqs_off_caller+0xbb/0x310 [ 290.371426] kobject: 'tx-0' (00000000833bd25a): kobject_add_internal: parent: 'queues', set: 'queues' [ 290.375885] ? trace_hardirqs_off_caller+0xbb/0x310 [ 290.375934] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.375948] ? trace_hardirqs_on_caller+0x310/0x310 [ 290.375961] ? trace_hardirqs_on_caller+0x310/0x310 [ 290.376043] ? task_prio+0x50/0x50 [ 290.376059] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.376079] ? check_preemption_disabled+0x48/0x280 [ 290.382569] kobject: 'tx-0' (00000000833bd25a): kobject_uevent_env [ 290.384534] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.384552] apic_timer_interrupt+0xf/0x20 [ 290.384559] [ 290.384571] RIP: 0010:__sanitizer_cov_trace_pc+0x26/0x50 [ 290.384583] Code: 5d c3 66 90 55 48 89 e5 48 8b 75 08 65 48 8b 04 25 40 ee 01 00 65 8b 15 a8 f5 81 7e 81 e2 00 01 1f 00 75 2b 8b 90 d8 12 00 00 <83> fa 02 75 20 48 8b 88 e0 12 00 00 8b 80 dc 12 00 00 48 8b 11 48 [ 290.384589] RSP: 0018:ffff888185396e50 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 290.384602] RAX: ffff8881d241e2c0 RBX: 0000000000000000 RCX: ffffffff81b37a9d [ 290.384615] RDX: 0000000000000000 RSI: ffffffff81b37aff RDI: 0000000000000005 [ 290.397627] kobject: 'tx-0' (00000000833bd25a): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bond/queues/tx-0' [ 290.400360] RBP: ffff888185396e50 R08: ffff8881d241e2c0 R09: fffff94000dd8c86 [ 290.406749] kobject: 'bond_slave_0' (00000000ec0211a3): kobject_add_internal: parent: 'net', set: 'devices' [ 290.411242] R10: fffff94000dd8c86 R11: ffffea0006ec6433 R12: ffffea0006ec6448 [ 290.416573] kobject: 'bond_slave_0' (00000000ec0211a3): kobject_uevent_env [ 290.420319] R13: 00007f33ac6db000 R14: dffffc0000000000 R15: ffffea0006ec6440 [ 290.430018] kobject: 'bond_slave_0' (00000000ec0211a3): fill_kobj_path: path = '/devices/virtual/net/bond_slave_0' [ 290.434774] ? unmap_page_range+0xeed/0x2930 [ 290.434799] ? unmap_page_range+0xf4f/0x2930 [ 290.440238] kobject: 'queues' (00000000070aca3a): kobject_add_internal: parent: 'bond_slave_0', set: '' [ 290.444631] unmap_page_range+0xf4f/0x2930 [ 290.444657] ? vm_normal_page_pmd+0x510/0x510 [ 290.444677] ? lock_release+0xa00/0xa00 [ 290.450340] kobject: 'queues' (00000000070aca3a): kobject_uevent_env [ 290.453218] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.472868] kobject: 'queues' (00000000070aca3a): kobject_uevent_env: filter function caused the event to drop! [ 290.474896] ? __lock_acquire+0x62f/0x4c20 [ 290.474909] ? __lock_acquire+0x62f/0x4c20 [ 290.474922] ? print_usage_bug+0xc0/0xc0 [ 290.474937] ? graph_lock+0x270/0x270 [ 290.474986] ? __mutex_lock+0x85e/0x16f0 [ 290.474997] ? mark_held_locks+0x130/0x130 [ 290.475075] ? uprobe_clear_state+0xb4/0x390 [ 290.475090] ? rcu_read_unlock_special+0x370/0x370 [ 290.475107] ? graph_lock+0x270/0x270 [ 290.480883] kobject: 'rx-0' (000000001b77784d): kobject_add_internal: parent: 'queues', set: 'queues' [ 290.481576] ? print_usage_bug+0xc0/0xc0 [ 290.487335] kobject: 'rx-0' (000000001b77784d): kobject_uevent_env [ 290.505917] ? find_held_lock+0x36/0x1c0 [ 290.505941] ? find_held_lock+0x36/0x1c0 [ 290.505966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.505977] ? uprobe_munmap+0x14c/0x450 [ 290.505990] ? uprobe_mmap+0x1130/0x1130 [ 290.506010] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 290.513948] kobject: 'rx-0' (000000001b77784d): fill_kobj_path: path = '/devices/virtual/net/bond_slave_0/queues/rx-0' [ 290.520981] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 290.520995] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 290.521086] ? pagevec_lru_move_fn+0x259/0x350 [ 290.521100] ? trace_hardirqs_off_caller+0x310/0x310 [ 290.521115] unmap_single_vma+0x19b/0x310 [ 290.521131] unmap_vmas+0x252/0x3d0 [ 290.521143] ? zap_vma_ptes+0x110/0x110 [ 290.521153] ? perf_trace_mm_lru_insertion+0x1490/0x1490 [ 290.521170] ? kasan_check_write+0x14/0x20 [ 290.521187] exit_mmap+0x2be/0x590 [ 290.536002] kobject: 'tx-0' (00000000cf2a68fa): kobject_add_internal: parent: 'queues', set: 'queues' [ 290.539413] ? __ia32_sys_munmap+0x80/0x80 [ 290.547262] kobject: 'tx-0' (00000000cf2a68fa): kobject_uevent_env [ 290.556545] ? mutex_unlock+0xd/0x10 [ 290.556570] ? __might_sleep+0x95/0x190 [ 290.556652] mmput+0x247/0x610 [ 290.556668] ? lock_downgrade+0x900/0x900 [ 290.556681] ? set_mm_exe_file+0x200/0x200 [ 290.556698] ? kasan_check_write+0x14/0x20 [ 290.556710] ? up_read+0x225/0x2c0 [ 290.556742] ? do_raw_spin_trylock+0x270/0x270 [ 290.556759] ? up_read_non_owner+0x100/0x100 [ 290.556772] ? __down_interruptible+0x700/0x700 [ 290.556818] flush_old_exec+0xb91/0x21a0 [ 290.556859] ? ext4_file_read_iter+0x193/0x3c0 [ 290.564777] kobject: 'tx-0' (00000000cf2a68fa): fill_kobj_path: path = '/devices/virtual/net/bond_slave_0/queues/tx-0' [ 290.571163] ? copy_strings_kernel+0x110/0x110 [ 290.669801] kobject: 'veth1_to_bond' (00000000cc61164c): kobject_add_internal: parent: 'net', set: 'devices' [ 290.671552] ? check_preemption_disabled+0x48/0x280 [ 290.685559] kobject: 'veth1_to_bond' (00000000cc61164c): kobject_uevent_env [ 290.689698] ? fsnotify_first_mark+0x350/0x350 [ 290.693690] kobject: 'veth1_to_bond' (00000000cc61164c): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond' [ 290.699968] ? __fsnotify_parent+0xcc/0x430 [ 290.699982] ? fsnotify+0xef0/0xef0 [ 290.700039] ? rw_verify_area+0x118/0x360 [ 290.700056] ? vfs_read+0x1ce/0x3e0 [ 290.714866] kobject: 'queues' (000000009d49d542): kobject_add_internal: parent: 'veth1_to_bond', set: '' [ 290.717743] ? kernel_read+0xab/0x120 [ 290.721818] kobject: 'queues' (000000009d49d542): kobject_uevent_env [ 290.726975] ? load_elf_phdrs+0x1cd/0x260 [ 290.726994] ? writenote+0x3d0/0x3d0 [ 290.744702] kobject: 'queues' (000000009d49d542): kobject_uevent_env: filter function caused the event to drop! [ 290.747497] ? kernel_read+0xab/0x120 [ 290.752079] kobject: 'rx-0' (00000000a3398977): kobject_add_internal: parent: 'queues', set: 'queues' [ 290.757153] load_elf_binary+0xa39/0x5620 [ 290.757169] ? find_held_lock+0x36/0x1c0 [ 290.757193] ? notesize.isra.5+0x80/0x80 [ 290.757211] ? lock_downgrade+0x900/0x900 [ 290.762693] kobject: 'rx-0' (00000000a3398977): kobject_uevent_env [ 290.764983] ? kasan_check_write+0x14/0x20 [ 290.764999] search_binary_handler+0x17d/0x570 [ 290.765015] __do_execve_file.isra.35+0x178c/0x2760 [ 290.765044] ? prepare_bprm_creds+0x120/0x120 [ 290.765058] ? __do_page_fault+0x65c/0xd70 [ 290.765069] ? __do_page_fault+0x402/0xd70 [ 290.765082] ? retint_kernel+0x2d/0x2d [ 290.765215] ? strncpy_from_user+0x191/0x5a0 [ 290.765234] ? strncpy_from_user+0x1a7/0x5a0 [ 290.769981] kobject: 'rx-0' (00000000a3398977): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond/queues/rx-0' [ 290.774660] ? strncpy_from_user+0x1aa/0x5a0 [ 290.774675] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.774689] ? strncpy_from_user+0x411/0x5a0 [ 290.774707] ? digsig_verify+0x1530/0x1530 [ 290.779754] kobject: 'tx-0' (0000000089bc1eae): kobject_add_internal: parent: 'queues', set: 'queues' [ 290.782466] ? kmem_cache_alloc+0x33f/0x730 [ 290.792277] kobject: 'tx-0' (0000000089bc1eae): kobject_uevent_env [ 290.796057] ? do_syscall_64+0x9a/0x820 [ 290.796077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.796116] ? getname_flags+0x26e/0x590 [ 290.796131] ? trace_hardirqs_off_caller+0x310/0x310 [ 290.796147] __x64_sys_execve+0x8f/0xc0 [ 290.796160] do_syscall_64+0x1b9/0x820 [ 290.796173] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.796188] ? syscall_return_slowpath+0x5e0/0x5e0 [ 290.796199] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.796212] ? trace_hardirqs_on_caller+0x310/0x310 [ 290.796224] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 290.796235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.796246] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.796262] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.796280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.803294] kobject: 'tx-0' (0000000089bc1eae): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond/queues/tx-0' [ 290.806316] RIP: 0033:0x455f07 [ 290.806342] Code: Bad RIP value. [ 290.814227] kobject: 'bond_slave_1' (000000005400197a): kobject_add_internal: parent: 'net', set: 'devices' [ 290.817622] RSP: 002b:00007ffe69678318 EFLAGS: 00000207 ORIG_RAX: 000000000000003b [ 290.817635] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000455f07 [ 290.817643] RDX: 00007ffe69678a18 RSI: 00007ffe69678350 RDI: 00000000004dca5b [ 290.817650] RBP: 00007ffe696784d0 R08: 0000000000000000 R09: 000000000000003f [ 290.817658] R10: 0000000000000008 R11: 0000000000000207 R12: 00007ffe696786b0 [ 290.817671] R13: 00007ffe69678678 R14: 0000000000000000 R15: 0000000000000000 [ 290.822803] kobject: 'bond_slave_1' (000000005400197a): kobject_uevent_env [ 290.826129] Modules linked in: [ 290.826170] ---[ end trace 983a68b6ba9bb525 ]--- [ 290.831280] kobject: 'bond_slave_1' (000000005400197a): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1' [ 290.834279] RIP: 0010:__list_add_valid.cold.2+0x23/0x2a [ 290.839081] kobject: 'queues' (000000007a09843b): kobject_add_internal: parent: 'bond_slave_1', set: '' [ 290.843362] Code: e8 00 1f d2 fd 0f 0b 48 89 d9 48 c7 c7 20 e6 80 88 e8 ef 1e d2 fd 0f 0b 48 89 f1 48 c7 c7 a0 e6 80 88 48 89 de e8 db 1e d2 fd <0f> 0b 90 90 90 90 90 55 48 89 e5 41 57 41 56 49 be 00 00 00 00 00 [ 290.847679] kobject: 'queues' (000000007a09843b): kobject_uevent_env [ 290.852009] RSP: 0018:ffff8881dad06dc0 EFLAGS: 00010286 [ 290.863212] kobject: 'queues' (000000007a09843b): kobject_uevent_env: filter function caused the event to drop! [ 290.867523] RAX: 0000000000000075 RBX: ffffffff8a1dca60 RCX: 0000000000000000 [ 290.867530] RDX: 0000000000000000 RSI: ffffffff816621c5 RDI: 0000000000000005 [ 290.867538] RBP: ffff8881dad06dd8 R08: ffff8881d241e2c0 R09: ffffed103b5a5020 [ 290.867547] R10: ffffed103b5a5020 R11: ffff8881dad28107 R12: ffff8881d3443db0 [ 290.867555] R13: ffff8881d3443b40 R14: ffffffff8a1dc820 R15: ffffffff8a1dcab0 [ 290.867566] FS: 0000000000000000(0000) GS:ffff8881dad00000(0000) knlGS:0000000000000000 [ 290.867574] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 290.867581] CR2: 0000000000455edd CR3: 00000001cddd5000 CR4: 00000000001406e0 [ 290.867592] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 290.867600] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 290.867608] Kernel panic - not syncing: Fatal exception in interrupt [ 290.868681] Kernel Offset: disabled [ 291.391946] Rebooting in 86400 seconds..