[ 42.397050][ T25] audit: type=1800 audit(1575385809.610:26): pid=7987 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 42.427624][ T25] audit: type=1800 audit(1575385809.610:27): pid=7987 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 42.453546][ T25] audit: type=1800 audit(1575385809.620:28): pid=7987 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 43.268877][ T25] audit: type=1800 audit(1575385810.510:29): pid=7987 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.10' (ECDSA) to the list of known hosts. 2019/12/03 15:10:17 fuzzer started 2019/12/03 15:10:19 dialing manager at 10.128.0.26:45711 2019/12/03 15:10:19 syscalls: 2689 2019/12/03 15:10:19 code coverage: enabled 2019/12/03 15:10:19 comparison tracing: enabled 2019/12/03 15:10:19 extra coverage: extra coverage is not supported by the kernel 2019/12/03 15:10:19 setuid sandbox: enabled 2019/12/03 15:10:19 namespace sandbox: enabled 2019/12/03 15:10:19 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 15:10:19 fault injection: enabled 2019/12/03 15:10:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 15:10:19 net packet injection: enabled 2019/12/03 15:10:19 net device setup: enabled 2019/12/03 15:10:19 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/03 15:10:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 15:10:20 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x5, 0x0, 0x0, {0x77359400}, {0x0, 0x7530}, {0x0, 0x0, 0x8001}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "82d36d79e8cf4e06"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x7, 0x0, 0x0, {0x77359400}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c61f2323d752075b"}}, 0x48}}, 0x0) 15:10:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'security.', ',^wlan0\x00'}, &(0x7f0000000080)=""/39, 0x27) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r0 = getpid() ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) r1 = socket$unix(0x1, 0x60a6710483320b48, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x4e23, @multicast1}}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe7) syzkaller login: [ 53.176221][ T8150] IPVS: ftp: loaded support on port[0] = 21 [ 53.305619][ T8150] chnl_net:caif_netlink_parms(): no params data found [ 53.341736][ T8153] IPVS: ftp: loaded support on port[0] = 21 [ 53.375442][ T8150] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.397596][ T8150] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.405223][ T8150] device bridge_slave_0 entered promiscuous mode 15:10:20 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000fffffffbffff7f261e21ccf67e1db900e565aa9a9d32c7627ffe6a54cdbd77b300"}, 0x60) getpeername$inet(r0, 0x0, &(0x7f0000000040)) [ 53.420503][ T8150] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.427960][ T8150] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.435784][ T8150] device bridge_slave_1 entered promiscuous mode [ 53.482757][ T8150] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.536701][ T8150] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.576574][ T8150] team0: Port device team_slave_0 added [ 53.587058][ T8153] chnl_net:caif_netlink_parms(): no params data found [ 53.599521][ T8150] team0: Port device team_slave_1 added [ 53.646689][ T8153] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.655726][ T8153] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.664922][ T8153] device bridge_slave_0 entered promiscuous mode 15:10:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) dup2(r0, r1) [ 53.740381][ T8150] device hsr_slave_0 entered promiscuous mode [ 53.789668][ T8150] device hsr_slave_1 entered promiscuous mode [ 53.836516][ T8153] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.857684][ T8153] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.865653][ T8153] device bridge_slave_1 entered promiscuous mode [ 53.912062][ T8153] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.939506][ T8153] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.967386][ T8156] IPVS: ftp: loaded support on port[0] = 21 [ 53.979039][ T8153] team0: Port device team_slave_0 added [ 53.987019][ T8153] team0: Port device team_slave_1 added 15:10:21 executing program 4: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x14}, 0x10) [ 54.037098][ T8158] IPVS: ftp: loaded support on port[0] = 21 [ 54.140194][ T8153] device hsr_slave_0 entered promiscuous mode [ 54.177942][ T8153] device hsr_slave_1 entered promiscuous mode 15:10:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = semget$private(0x0, 0x0, 0x2) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x0, 0x800000003, 0x81) bind(r4, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r4, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x11, 0x800000003, 0x81) r7 = socket(0x11, 0x800000003, 0x81) bind(r7, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r7, &(0x7f0000007540)=ANY=[@ANYBLOB="0000000000000000008864000000000400005700"/32], 0xfdef) r8 = fcntl$getown(r3, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r10, 0x0) r11 = getgid() getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r12, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r13) r14 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r14, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f410005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53006000c659ca807737f40000002bc05500", 0x12}], 0x2) r15 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) r18 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r18, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f410005a90f57f07703aeff0f64ebbee0796", 0x17}, {&(0x7f0000000040)="53006000c659ca807737f40000002bc055001708000000", 0x17}], 0x2) r19 = accept4$rose(r4, &(0x7f00000005c0)=@short={0xb, @dev, @default, 0x1, @bcast}, 0x0, 0x800) r20 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r20, &(0x7f0000000000)=[{&(0x7f0000000040)="53006000c659ca807737f40000002bc05500", 0x12}], 0x1) sendmsg$unix(r7, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="e0132a18608f5db7e76a5f5f1874b72028532d4524c57452a95f96f390317ac646fc7cf23b0b004c458e5a9f82bcf2a9520210164cce3c37882892964bd9dbd6919ec36079acc94eee56325ca73a3cc0e8673e3a249d24aed453b494272dd1fd06dabc1ea38276fe14d82e20eb991bfa476c03fb269c813284e0e3ec9502489ffa18004fbaf2a10a0e6e5661ca1b8c8391ec6e953e99c7239bcefe40b667970009d7c08177b5091fcca3f46a2387d506b19785cbbb83fae50351fbe005e7f0d138ebcd5d3dc7c3fce52a0759384dcf3c6c61ce71e0a1cd58189a9d77bafc44e3c9c8156d9e5a3969ec0796cef8ab7415a4", 0xf1}], 0x1, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {r8, r10, r11}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r13}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r14, r15, r6, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r17}}}, @rights={{0x30, 0x1, 0x1, [r18, 0xffffffffffffffff, 0xffffffffffffffff, r19, r6, r5, r20, 0xffffffffffffffff]}}], 0xb8, 0x1}, 0x40) r21 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r22) r23 = geteuid() setresuid(r22, r23, 0x0) r24 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r24, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) fstat(r24, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000500)={{0x4, 0xffffffffffffffff, r13, r22, r25, 0x2}, 0x3, 0x62b1, 0x1}) r26 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r27) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0xffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="fe9a5b02c8974a571b61a41499cd4799a47b714f57dd5fcaa8fb2ad2c984aa25d64cf29b8ab1fd663a7f741f01ff5bb231b3065c9edd69e0916eabdb022bdf40b60c66f56da7e58cad505caefc915f7d75e5504ffe5a35dac58180f040be005213e3126dc6b1ea8611a2b648b2f9fc321ae2e7cdeaa5e496220b7aed33ed9a285fea535531f6af77707b357d9beb886fa6b2d25d3bb1f3ecde12d96578ef299799adc75263a8a9762cca6adb4055c1a96e51f110346da67e5c5d80e48dd8adbd9018275b6d2e08dfbaf0df9a67ef70562063cba7bb7dca53aa8ce9ad9d60c1082d35b1038422848bc9278f24cdbda51989", 0xf1, 0x7}], 0x2006420, &(0x7f0000000280)={[{@gid={'gid', 0x3d, r1}}, {@gid={'gid', 0x3d, r13}}, {@uid={'uid', 0x3d, r27}}, {@umask={'umask', 0x3d, 0x7}}, {@force='force'}, {@decompose='decompose'}, {@nodecompose='nodecompose'}, {@creator={'creator', 0x3d, "0dbd4e31"}}, {@barrier='barrier'}, {@session={'session', 0x3d, 0x4}}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '\x00'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}) r28 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r28, 0xae60) r29 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r29, 0x2400, 0x958f) [ 54.247908][ T8153] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.260434][ T8150] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 54.321192][ T8150] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 54.369223][ T8150] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 54.409359][ T8150] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 54.465193][ T8160] IPVS: ftp: loaded support on port[0] = 21 [ 54.511566][ T8162] IPVS: ftp: loaded support on port[0] = 21 [ 54.592136][ T8153] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 54.651101][ T8153] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 54.700551][ T8153] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 54.751069][ T8153] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 54.788818][ T8156] chnl_net:caif_netlink_parms(): no params data found [ 54.856331][ T8156] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.864359][ T8156] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.872852][ T8156] device bridge_slave_0 entered promiscuous mode [ 54.885366][ T8150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.899606][ T8156] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.906671][ T8156] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.914533][ T8156] device bridge_slave_1 entered promiscuous mode [ 54.932181][ T8156] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.943897][ T8156] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.995265][ T8150] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.034643][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.043787][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.052482][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.061083][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.069642][ T3030] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.076746][ T3030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.087760][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.098965][ T8156] team0: Port device team_slave_0 added [ 55.107277][ T8156] team0: Port device team_slave_1 added [ 55.179340][ T8156] device hsr_slave_0 entered promiscuous mode [ 55.247953][ T8156] device hsr_slave_1 entered promiscuous mode [ 55.287655][ T8156] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.295393][ T8158] chnl_net:caif_netlink_parms(): no params data found [ 55.305769][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.315142][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.324002][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.331081][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.339932][ T8160] chnl_net:caif_netlink_parms(): no params data found [ 55.379382][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.393136][ T8160] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.400639][ T8160] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.409019][ T8160] device bridge_slave_0 entered promiscuous mode [ 55.416494][ T8160] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.423651][ T8160] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.431626][ T8160] device bridge_slave_1 entered promiscuous mode [ 55.447703][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.457077][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.466428][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.474972][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.484846][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.493418][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.501672][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.509990][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.518514][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.570801][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.597094][ T8160] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.608892][ T8160] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.619765][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.633047][ T8156] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 55.684173][ T8156] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 55.749068][ T8162] chnl_net:caif_netlink_parms(): no params data found [ 55.778715][ T8158] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.785920][ T8158] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.795026][ T8158] device bridge_slave_0 entered promiscuous mode [ 55.802565][ T8156] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 55.872838][ T8153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.894696][ T8158] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.902077][ T8158] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.910139][ T8158] device bridge_slave_1 entered promiscuous mode [ 55.916944][ T8156] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 55.950484][ T8160] team0: Port device team_slave_0 added [ 55.957277][ T8162] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.967522][ T8162] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.975246][ T8162] device bridge_slave_0 entered promiscuous mode [ 55.993825][ T8162] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.002269][ T8162] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.010980][ T8162] device bridge_slave_1 entered promiscuous mode [ 56.026125][ T8160] team0: Port device team_slave_1 added [ 56.034242][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 56.042208][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 56.056071][ T8158] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.068853][ T8150] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.090718][ T8162] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.101347][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.109845][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.119515][ T8158] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.131514][ T8153] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.154298][ T8162] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.221170][ T8160] device hsr_slave_0 entered promiscuous mode [ 56.257884][ T8160] device hsr_slave_1 entered promiscuous mode [ 56.317668][ T8160] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.335463][ T8158] team0: Port device team_slave_0 added [ 56.349591][ T3902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.358232][ T3902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.366588][ T3902] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.373932][ T3902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.381638][ T3902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.390623][ T3902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.399291][ T3902] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.406327][ T3902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.413911][ T3902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.422745][ T3902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.463553][ T8162] team0: Port device team_slave_0 added [ 56.479219][ T8158] team0: Port device team_slave_1 added [ 56.505161][ T8153] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 56.516278][ T8153] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 56.557608][ T8153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.457473][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 161.464304][ C1] rcu: 1-...!: (10499 ticks this GP) idle=9ba/1/0x4000000000000002 softirq=10070/10070 fqs=41 [ 161.474909][ C1] (t=10500 jiffies g=6029 q=287) [ 161.479922][ C1] rcu: rcu_preempt kthread starved for 10416 jiffies! g6029 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 161.491007][ C1] rcu: RCU grace-period kthread stack dump: [ 161.496880][ C1] rcu_preempt R running task 28992 10 2 0x80004000 [ 161.504766][ C1] Call Trace: [ 161.508048][ C1] __schedule+0x9a0/0xcc0 [ 161.512371][ C1] schedule+0x181/0x210 [ 161.516512][ C1] schedule_timeout+0x14f/0x240 [ 161.521346][ C1] ? run_local_timers+0x120/0x120 [ 161.526362][ C1] rcu_gp_kthread+0xed8/0x1770 [ 161.531137][ C1] kthread+0x332/0x350 [ 161.535187][ C1] ? rcu_report_qs_rsp+0x140/0x140 [ 161.540280][ C1] ? kthread_blkcg+0xe0/0xe0 [ 161.544855][ C1] ret_from_fork+0x24/0x30 [ 161.549267][ C1] NMI backtrace for cpu 1 [ 161.553583][ C1] CPU: 1 PID: 4248 Comm: udevd Not tainted 5.4.0-syzkaller #0 [ 161.561015][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.571050][ C1] Call Trace: [ 161.574317][ C1] [ 161.577156][ C1] dump_stack+0x1fb/0x318 [ 161.581476][ C1] nmi_cpu_backtrace+0xaf/0x1a0 [ 161.586307][ C1] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 161.592460][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 161.598509][ C1] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 161.604475][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 161.610348][ C1] rcu_dump_cpu_stacks+0x15a/0x220 [ 161.615448][ C1] rcu_sched_clock_irq+0xe25/0x1ad0 [ 161.620631][ C1] ? trace_hardirqs_off+0x74/0x80 [ 161.625643][ C1] update_process_times+0x12d/0x180 [ 161.630830][ C1] tick_sched_timer+0x263/0x420 [ 161.635664][ C1] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 161.641196][ C1] __hrtimer_run_queues+0x403/0x840 [ 161.646395][ C1] hrtimer_interrupt+0x38c/0xda0 [ 161.651333][ C1] ? debug_smp_processor_id+0x9/0x20 [ 161.656605][ C1] smp_apic_timer_interrupt+0x109/0x280 [ 161.662137][ C1] apic_timer_interrupt+0xf/0x20 [ 161.667057][ C1] [ 161.669983][ C1] RIP: 0010:__memcg_kmem_uncharge+0x3b/0x2e0 [ 161.675946][ C1] Code: 89 fc 48 b8 00 00 00 00 00 fc ff df 4c 8d 77 38 4d 89 f5 49 c1 ed 03 41 80 7c 05 00 00 74 08 4c 89 f7 e8 d8 f4 fa ff 4d 8b 3e 01 00 00 00 89 d9 d3 e0 4d 85 ff 0f 84 bf 01 00 00 4c 39 3d 04 [ 161.695537][ C1] RSP: 0018:ffffc90001fa7720 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 161.704106][ C1] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff8880a2d7a400 [ 161.712060][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0002a26700 [ 161.720014][ C1] RBP: ffffc90001fa7750 R08: 000000000003a768 R09: ffffed1011aeeaef [ 161.727967][ C1] R10: ffffed1011aeeaef R11: 0000000000000000 R12: ffffea0002a26700 [ 161.735945][ C1] R13: 1ffffd4000544ce7 R14: ffffea0002a26738 R15: 0000000000000000 [ 161.743931][ C1] ? free_thread_stack+0x124/0x590 [ 161.749032][ C1] free_thread_stack+0x12e/0x590 [ 161.753959][ C1] put_task_stack+0xa3/0x130 [ 161.758536][ C1] finish_task_switch+0x3f1/0x550 [ 161.763552][ C1] __schedule+0x9a8/0xcc0 [ 161.767876][ C1] schedule+0x181/0x210 [ 161.772019][ C1] schedule_hrtimeout_range_clock+0x3c7/0x510 [ 161.778090][ C1] ? trace_hrtimer_expire_exit+0x2d0/0x2d0 [ 161.783886][ C1] schedule_hrtimeout_range+0x2a/0x40 [ 161.789240][ C1] poll_schedule_timeout+0x11c/0x1c0 [ 161.794513][ C1] do_sys_poll+0x82f/0x1240 [ 161.799022][ C1] ? debug_object_activate+0x2f7/0x6f0 [ 161.804466][ C1] ? debug_object_active_state+0x1e3/0x4a0 [ 161.810263][ C1] ? __lock_acquire+0xc75/0x1be0 [ 161.815190][ C1] ? __x32_compat_sys_ppoll_time64+0xd0/0xd0 [ 161.821166][ C1] ? trace_hardirqs_on+0x74/0x80 [ 161.826086][ C1] ? ktime_get_ts64+0x6e/0x2c0 [ 161.830842][ C1] ? ktime_get_ts64+0x6e/0x2c0 [ 161.835589][ C1] ? read_seqcount_begin+0x125/0x1c0 [ 161.840862][ C1] ? trace_hardirqs_on+0x74/0x80 [ 161.845782][ C1] ? ktime_get_ts64+0x6e/0x2c0 [ 161.850533][ C1] ? read_seqcount_begin+0x17a/0x1c0 [ 161.855804][ C1] ? ktime_get_ts64+0x236/0x2c0 [ 161.860641][ C1] ? timespec64_add_safe+0x171/0x1b0 [ 161.865918][ C1] __se_sys_poll+0x1b0/0x360 [ 161.870501][ C1] __x64_sys_poll+0x7b/0x90 [ 161.874994][ C1] do_syscall_64+0xf7/0x1c0 [ 161.879484][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 161.885360][ C1] RIP: 0033:0x7f4bf1b67678 [ 161.889760][ C1] Code: 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 82 8f 2b 00 85 c0 75 17 48 63 d2 b8 07 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 161.909350][ C1] RSP: 002b:00007ffde064dba0 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 161.917749][ C1] RAX: ffffffffffffffda RBX: 20c49ba5e353f7cf RCX: 00007f4bf1b67678 [ 161.925704][ C1] RDX: 000000000000ee2e RSI: 0000000000000001 RDI: 00007ffde064dc60 [ 161.933657][ C1] RBP: 0000000000000000 R08: 00007ffde064dbb0 R09: 00007ffde07f40b8 [ 161.941613][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000209a010 [ 161.949591][ C1] R13: 0000000000001feb R14: 00007ffde064dc34 R15: 000000000208a250