[ 43.072584][ T23] audit: type=1800 audit(1575403552.264:26): pid=8042 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 43.115704][ T23] audit: type=1800 audit(1575403552.264:27): pid=8042 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 43.136627][ T23] audit: type=1800 audit(1575403552.264:28): pid=8042 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 43.800762][ T23] audit: type=1800 audit(1575403553.014:29): pid=8042 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.172' (ECDSA) to the list of known hosts. 2019/12/03 20:06:03 fuzzer started 2019/12/03 20:06:04 dialing manager at 10.128.0.26:42111 2019/12/03 20:06:04 syscalls: 2689 2019/12/03 20:06:04 code coverage: enabled 2019/12/03 20:06:04 comparison tracing: enabled 2019/12/03 20:06:04 extra coverage: extra coverage is not supported by the kernel 2019/12/03 20:06:04 setuid sandbox: enabled 2019/12/03 20:06:04 namespace sandbox: enabled 2019/12/03 20:06:04 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 20:06:04 fault injection: enabled 2019/12/03 20:06:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 20:06:04 net packet injection: enabled 2019/12/03 20:06:04 net device setup: enabled 2019/12/03 20:06:04 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/03 20:06:04 devlink PCI setup: PCI device 0000:00:10.0 is not available 20:06:05 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000000)=@sha1={0x1, "ace8644ff672c23096cebfcdc577ff5c9dbd13c3"}, 0x15, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x3, 0x0) 20:06:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000002c0)=ANY=[@ANYBLOB="1f0000000000000002004e24ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e20ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100010000000000000000000000000000000000000002004e230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ffffffff00000000000000000000000000000000000000010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e237f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010c7919223f41071f37ad2ca00"/1155], 0x490) syzkaller login: [ 56.650270][ T8206] IPVS: ftp: loaded support on port[0] = 21 [ 56.769207][ T8206] chnl_net:caif_netlink_parms(): no params data found [ 56.839599][ T8206] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.862325][ T8206] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.870265][ T8206] device bridge_slave_0 entered promiscuous mode 20:06:06 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = eventfd2(0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x11, 0x0, {0x0, 0x1}}, 0x14) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = dup(r0) read$FUSE(r1, &(0x7f0000000280), 0x1000) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0xffffffb5, 0x2, 0xfffffffffffffffd}) [ 56.889103][ T8209] IPVS: ftp: loaded support on port[0] = 21 [ 56.895563][ T8206] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.904148][ T8206] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.917083][ T8206] device bridge_slave_1 entered promiscuous mode [ 56.960513][ T8206] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.986821][ T8206] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.075377][ T8206] team0: Port device team_slave_0 added [ 57.093946][ T8206] team0: Port device team_slave_1 added [ 57.105714][ T8209] chnl_net:caif_netlink_parms(): no params data found 20:06:06 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) sendmmsg$sock(r0, &(0x7f0000006180)=[{{0x0, 0x0, &(0x7f0000002fc0)=[{&(0x7f00000008c0)="4de024fe4c0000e669910ac2b38f", 0xe}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004700)=[@mark={{0x10}}], 0x10}}], 0x2, 0x0) [ 57.195768][ T8206] device hsr_slave_0 entered promiscuous mode [ 57.252615][ T8206] device hsr_slave_1 entered promiscuous mode [ 57.330971][ T8212] IPVS: ftp: loaded support on port[0] = 21 [ 57.363796][ T8209] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.370881][ T8209] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) exit(0x0) close(r0) [ 57.392924][ T8209] device bridge_slave_0 entered promiscuous mode [ 57.415058][ T8206] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 57.467259][ T8209] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.476726][ T8209] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.504539][ T8209] device bridge_slave_1 entered promiscuous mode [ 57.545551][ T8206] netdevsim netdevsim0 netdevsim1: renamed from eth1 20:06:06 executing program 5: r0 = socket(0x2, 0x3, 0x11) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, 0x0, 0x0, 0x8002, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040)="98983389037e4d51", 0x3dc, 0x0, 0x0, 0x10f) [ 57.673553][ T8209] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.687102][ T8206] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 57.697300][ T8214] IPVS: ftp: loaded support on port[0] = 21 [ 57.745616][ T8206] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 57.785065][ T8209] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.816343][ T8218] IPVS: ftp: loaded support on port[0] = 21 [ 57.839839][ T8216] IPVS: ftp: loaded support on port[0] = 21 [ 57.852367][ T8209] team0: Port device team_slave_0 added [ 57.869946][ T8209] team0: Port device team_slave_1 added [ 57.994658][ T8209] device hsr_slave_0 entered promiscuous mode [ 58.052614][ T8209] device hsr_slave_1 entered promiscuous mode [ 58.092432][ T8209] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.136579][ T8212] chnl_net:caif_netlink_parms(): no params data found [ 58.185715][ T8214] chnl_net:caif_netlink_parms(): no params data found [ 58.231669][ T8212] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.243677][ T8212] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.251267][ T8212] device bridge_slave_0 entered promiscuous mode [ 58.276204][ T8214] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.283787][ T8214] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.291841][ T8214] device bridge_slave_0 entered promiscuous mode [ 58.299597][ T8214] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.306719][ T8214] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.315042][ T8214] device bridge_slave_1 entered promiscuous mode [ 58.325158][ T8209] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 58.384731][ T8212] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.391821][ T8212] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.399647][ T8212] device bridge_slave_1 entered promiscuous mode [ 58.434467][ T8209] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 58.485800][ T8209] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 58.557194][ T8214] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.577011][ T8212] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.586518][ T8209] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 58.656225][ T8214] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.686560][ T8212] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.708180][ T8206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.738043][ T8216] chnl_net:caif_netlink_parms(): no params data found [ 58.753874][ T8214] team0: Port device team_slave_0 added [ 58.763097][ T8214] team0: Port device team_slave_1 added [ 58.775707][ T8212] team0: Port device team_slave_0 added [ 58.796376][ T8218] chnl_net:caif_netlink_parms(): no params data found [ 58.806880][ T8212] team0: Port device team_slave_1 added [ 58.831792][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.840277][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.925019][ T8212] device hsr_slave_0 entered promiscuous mode [ 59.012568][ T8212] device hsr_slave_1 entered promiscuous mode [ 59.062372][ T8212] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.071158][ T8206] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.124971][ T8214] device hsr_slave_0 entered promiscuous mode [ 59.165327][ T8214] device hsr_slave_1 entered promiscuous mode [ 59.222441][ T8214] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.257706][ T8216] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.267046][ T8216] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.275061][ T8216] device bridge_slave_0 entered promiscuous mode [ 59.286952][ T8216] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.294251][ T8216] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.302361][ T8216] device bridge_slave_1 entered promiscuous mode [ 59.309429][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.318276][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.326944][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.334253][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.342736][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.351251][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.359644][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.368733][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.388451][ T8218] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.398324][ T8218] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.407718][ T8218] device bridge_slave_0 entered promiscuous mode [ 59.419299][ T8218] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.426694][ T8218] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.434708][ T8218] device bridge_slave_1 entered promiscuous mode [ 59.443382][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.451311][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.459962][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.486217][ T8214] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 59.559338][ T8214] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 59.617638][ T8214] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 59.676926][ T8212] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 59.723594][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.732884][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.741631][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.750680][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.759794][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.769558][ T8216] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.789435][ T8218] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.800650][ T8214] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 59.853689][ T8212] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 59.885399][ T8216] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.896059][ T8218] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.907756][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.917468][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.926139][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.934857][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.950599][ T8209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.958389][ T8206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.966432][ T8212] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 60.014612][ T8218] team0: Port device team_slave_0 added [ 60.021615][ T8218] team0: Port device team_slave_1 added [ 60.029568][ T8212] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 60.082713][ T8216] team0: Port device team_slave_0 added [ 60.092761][ T8216] team0: Port device team_slave_1 added [ 60.127628][ T8219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.136123][ T8219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.147560][ T8209] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.205913][ T8218] device hsr_slave_0 entered promiscuous mode [ 60.242825][ T8218] device hsr_slave_1 entered promiscuous mode [ 60.282340][ T8218] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.336859][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.346238][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.355042][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.362091][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.369697][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.378880][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.387387][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.394479][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.401993][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.409638][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.417464][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.430795][ T8206] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.524991][ T8216] device hsr_slave_0 entered promiscuous mode [ 60.572876][ T8216] device hsr_slave_1 entered promiscuous mode [ 60.612410][ T8216] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.634608][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.643655][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.652771][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.661779][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.670434][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.679550][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.689059][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.723378][ T8209] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 60.739527][ T8209] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.765539][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.774817][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.784070][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.793079][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.801398][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.831277][ T8214] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.858198][ T8212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.885732][ T8216] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 60.910924][ T23] kauditd_printk_skb: 1 callbacks suppressed [ 60.910934][ T23] audit: type=1804 audit(1575403570.124:31): pid=8227 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir334869148/syzkaller.R6SS2u/0/file0" dev="sda1" ino=16521 res=1 [ 165.942182][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 165.948985][ C0] rcu: 0-...!: (10499 ticks this GP) idle=786/1/0x4000000000000002 softirq=10401/10401 fqs=42 [ 165.959654][ C0] (t=10501 jiffies g=6189 q=66) [ 165.964589][ C0] rcu: rcu_preempt kthread starved for 10418 jiffies! g6189 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 165.976025][ C0] rcu: RCU grace-period kthread stack dump: [ 165.981900][ C0] rcu_preempt R running task 29032 10 2 0x80004000 [ 165.989791][ C0] Call Trace: [ 165.993076][ C0] __schedule+0x9a0/0xcc0 [ 165.997415][ C0] schedule+0x181/0x210 [ 166.001566][ C0] schedule_timeout+0x14f/0x240 [ 166.006435][ C0] ? run_local_timers+0x120/0x120 [ 166.011457][ C0] rcu_gp_kthread+0xed8/0x1770 [ 166.016225][ C0] kthread+0x332/0x350 [ 166.020283][ C0] ? rcu_report_qs_rsp+0x140/0x140 [ 166.025388][ C0] ? kthread_blkcg+0xe0/0xe0 [ 166.029972][ C0] ret_from_fork+0x24/0x30 [ 166.034415][ C0] NMI backtrace for cpu 0 [ 166.038910][ C0] CPU: 0 PID: 8227 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 166.047129][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.057184][ C0] Call Trace: [ 166.060458][ C0] [ 166.063314][ C0] dump_stack+0x1fb/0x318 [ 166.067636][ C0] nmi_cpu_backtrace+0xaf/0x1a0 [ 166.072472][ C0] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 166.078614][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 166.084673][ C0] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 166.090646][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 166.096569][ C0] rcu_dump_cpu_stacks+0x15a/0x220 [ 166.101687][ C0] rcu_sched_clock_irq+0xe25/0x1ad0 [ 166.106881][ C0] ? trace_hardirqs_off+0x74/0x80 [ 166.111913][ C0] update_process_times+0x12d/0x180 [ 166.117124][ C0] tick_sched_timer+0x263/0x420 [ 166.121962][ C0] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 166.127501][ C0] __hrtimer_run_queues+0x403/0x840 [ 166.132705][ C0] hrtimer_interrupt+0x38c/0xda0 [ 166.137662][ C0] ? debug_smp_processor_id+0x9/0x20 [ 166.142942][ C0] smp_apic_timer_interrupt+0x109/0x280 [ 166.148480][ C0] apic_timer_interrupt+0xf/0x20 [ 166.153402][ C0] [ 166.156338][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x48/0x50 [ 166.162967][ C0] Code: 80 13 00 00 83 fa 02 75 21 48 8b 91 88 13 00 00 48 8b 32 48 8d 7e 01 8b 89 84 13 00 00 48 39 cf 73 08 48 89 44 f2 08 48 89 3a 0f 1f 80 00 00 00 00 4c 8b 04 24 65 48 8b 04 25 c0 1d 02 00 65 [ 166.183029][ C0] RSP: 0018:ffffc900026774a0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 166.191447][ C0] RAX: ffffffff81486ea4 RBX: ffffea0002a0bcc0 RCX: 0000000000040000 [ 166.199414][ C0] RDX: ffffc90001fe9000 RSI: 000000000003ffff RDI: 0000000000040000 [ 166.207375][ C0] RBP: ffffc900026774e0 R08: dffffc0000000000 R09: fffffbfff120248a [ 166.215340][ C0] R10: fffffbfff120248a R11: 0000000000000000 R12: ffff888095dfe2a0 [ 166.223304][ C0] R13: dffffc0000000000 R14: 1ffff11012bbfc54 R15: ffff8880a8a43a28 [ 166.231285][ C0] ? free_thread_stack+0x124/0x590 [ 166.236391][ C0] ? free_thread_stack+0x124/0x590 [ 166.242714][ C0] put_task_stack+0xa3/0x130 [ 166.247305][ C0] finish_task_switch+0x3f1/0x550 [ 166.252329][ C0] __schedule+0x9a8/0xcc0 [ 166.256692][ C0] ? ___preempt_schedule+0x16/0x18 [ 166.261808][ C0] preempt_schedule+0xdb/0x120 [ 166.266565][ C0] ___preempt_schedule+0x16/0x18 [ 166.271846][ C0] _raw_spin_unlock_irqrestore+0xcc/0xe0 [ 166.277475][ C0] __wake_up+0xe1/0x150 [ 166.281655][ C0] audit_log_end+0x199/0x230 [ 166.286251][ C0] integrity_audit_msg+0x2dc/0x370 [ 166.291367][ C0] ima_add_violation+0x3cf/0x470 [ 166.296312][ C0] process_measurement+0x623/0x18d0 [ 166.301609][ C0] ? rcu_lock_release+0x9/0x30 [ 166.306371][ C0] ? rcu_lock_release+0x21/0x30 [ 166.311240][ C0] ? smk_of_task_struct+0x1c5/0x1d0 [ 166.316522][ C0] ? smack_task_getsecid+0x26/0x90 [ 166.321633][ C0] ima_file_check+0x9b/0xe0 [ 166.326136][ C0] path_openat+0x1760/0x44a0 [ 166.330764][ C0] do_filp_open+0x192/0x3d0 [ 166.335286][ C0] do_sys_open+0x29f/0x560 [ 166.339964][ C0] __x64_sys_open+0x87/0x90 [ 166.344462][ C0] do_syscall_64+0xf7/0x1c0 [ 166.348970][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.354871][ C0] RIP: 0033:0x45a679 [ 166.358761][ C0] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.378369][ C0] RSP: 002b:00007fc286086c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 166.386921][ C0] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 166.394891][ C0] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020000040 [ 166.402861][ C0] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 166.410998][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc2860876d4 [ 166.419049][ C0] R13: 00000000004c7b2a R14: 00000000004deaf8 R15: 00000000ffffffff