[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 43.173782][ T23] audit: type=1800 audit(1575410705.513:25): pid=8008 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 43.215752][ T23] audit: type=1800 audit(1575410705.513:26): pid=8008 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 43.257526][ T23] audit: type=1800 audit(1575410705.513:27): pid=8008 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.156' (ECDSA) to the list of known hosts. 2019/12/03 22:05:16 fuzzer started 2019/12/03 22:05:17 dialing manager at 10.128.0.26:42111 2019/12/03 22:05:17 syscalls: 2689 2019/12/03 22:05:17 code coverage: enabled 2019/12/03 22:05:17 comparison tracing: enabled 2019/12/03 22:05:17 extra coverage: extra coverage is not supported by the kernel 2019/12/03 22:05:17 setuid sandbox: enabled 2019/12/03 22:05:17 namespace sandbox: enabled 2019/12/03 22:05:17 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 22:05:17 fault injection: enabled 2019/12/03 22:05:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 22:05:17 net packet injection: enabled 2019/12/03 22:05:17 net device setup: enabled 2019/12/03 22:05:17 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/03 22:05:17 devlink PCI setup: PCI device 0000:00:10.0 is not available 22:05:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) socket(0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000980)=[{{&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000280), 0x10, 0x0}}], 0x2, 0x20000000) 22:05:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000340)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30}}}, 0xb8}}, 0x0) syzkaller login: [ 56.532545][ T8174] IPVS: ftp: loaded support on port[0] = 21 [ 56.683385][ T8174] chnl_net:caif_netlink_parms(): no params data found [ 56.744537][ T8177] IPVS: ftp: loaded support on port[0] = 21 [ 56.751285][ T8174] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.763550][ T8174] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.772627][ T8174] device bridge_slave_0 entered promiscuous mode 22:05:19 executing program 2: syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x400c}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) [ 56.788810][ T8174] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.806059][ T8174] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.814198][ T8174] device bridge_slave_1 entered promiscuous mode [ 56.857039][ T8174] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.879840][ T8174] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.971056][ T8174] team0: Port device team_slave_0 added [ 56.982661][ T8177] chnl_net:caif_netlink_parms(): no params data found [ 56.994819][ T8174] team0: Port device team_slave_1 added [ 57.008097][ T8180] IPVS: ftp: loaded support on port[0] = 21 22:05:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RRENAMEAT(r1, &(0x7f00000000c0)={0x7}, 0x7) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0xc9) r2 = accept$alg(r0, 0x0, 0x0) read$alg(r2, &(0x7f0000000000)=""/232, 0xe8) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = dup(0xffffffffffffffff) setns(r4, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x40, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x870fd434627e2475, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, r5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='schedstat\x00') r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) r7 = memfd_create(&(0x7f0000000440)='\xb3\x17MS\xdb\xe0\x91~\xd8\x10\xb3\xd4\x9b\xfa\xdc\x1c\xb2\xc7\xdcp<\xefB\x05J\xe4cE\xbe\xd1C\xb5J\x16\'\xfb~\xfa\xfd\xbd\xdb\xc5\'\x8dmm\x9d\x9d\x1cv\x91y\xca\xec\xc7\xa5\xfa\xdf\xdc\xa7&!^\xac\x89a\x8c4\xa6\x85~e< \xc8d\xc4\xce\x7f\xb80\xd3\x03\x97\xea\x98\xfb.x\x1a3\x17\r\x00\xc8\xd0G\x1dq\x9c\x90g7$S8Sw:(+\xd6x$\xd4\xb2L\xf8\xf0<\n-\xe6\xb1\x0e&f\xec{YP%f\x02,M@a{\xe1\xeb*\x93\t', 0x0) write$FUSE_DIRENT(r7, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r7, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') preadv(r9, &(0x7f00000017c0), 0x333, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)) getpgid(0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) capset(&(0x7f0000000280)={0xccc0198, r10}, &(0x7f00000002c0)={0x5, 0x9, 0x9, 0x5, 0x0, 0xffffffff}) geteuid() r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) io_setup(0x8, &(0x7f0000000280)=0x0) r13 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r12, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r13, 0x0}]) r14 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000001c0)=0xc) r15 = epoll_create1(0x0) fcntl$lock(r15, 0x7, &(0x7f0000000040)) pread64(r8, 0x0, 0x0, 0xa4) [ 57.150261][ T8174] device hsr_slave_0 entered promiscuous mode [ 57.208058][ T8174] device hsr_slave_1 entered promiscuous mode 22:05:19 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x20000000001, 0x1) sendto(r0, 0x0, 0x0, 0x20008805, 0x0, 0x0) [ 57.255529][ T8177] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.264652][ T8177] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.274564][ T8177] device bridge_slave_0 entered promiscuous mode [ 57.310399][ T8182] IPVS: ftp: loaded support on port[0] = 21 [ 57.329556][ T8177] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.337628][ T8177] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.351863][ T8177] device bridge_slave_1 entered promiscuous mode [ 57.433955][ T8174] netdevsim netdevsim0 netdevsim0: renamed from eth0 22:05:19 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) openat$vcs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcs\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000540)={0x0, 0x0, 0xff}) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 57.490664][ T8174] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 57.587523][ T8177] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.607430][ T8174] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 57.617324][ T8184] IPVS: ftp: loaded support on port[0] = 21 [ 57.637618][ T8174] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 57.704986][ T8177] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.747352][ T8177] team0: Port device team_slave_0 added [ 57.754709][ T8177] team0: Port device team_slave_1 added [ 57.766384][ T8180] chnl_net:caif_netlink_parms(): no params data found [ 57.784816][ T8186] IPVS: ftp: loaded support on port[0] = 21 [ 57.888351][ T8177] device hsr_slave_0 entered promiscuous mode [ 57.936827][ T8177] device hsr_slave_1 entered promiscuous mode [ 57.985943][ T8177] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.015125][ T8182] chnl_net:caif_netlink_parms(): no params data found [ 58.054654][ T8180] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.063338][ T8180] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.071167][ T8180] device bridge_slave_0 entered promiscuous mode [ 58.087020][ T8180] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.094141][ T8180] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.103888][ T8180] device bridge_slave_1 entered promiscuous mode [ 58.121096][ T8182] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.129574][ T8182] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.137353][ T8182] device bridge_slave_0 entered promiscuous mode [ 58.160020][ T8182] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.169264][ T8182] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.177301][ T8182] device bridge_slave_1 entered promiscuous mode [ 58.205435][ T8177] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 58.247704][ T8177] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 58.306167][ T8182] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.323624][ T8180] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.334597][ T8180] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.344112][ T8177] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 58.405236][ T8182] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.424588][ T8174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.449205][ T8177] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 58.509251][ T8186] chnl_net:caif_netlink_parms(): no params data found [ 58.528343][ T8180] team0: Port device team_slave_0 added [ 58.579047][ T8180] team0: Port device team_slave_1 added [ 58.587203][ T8182] team0: Port device team_slave_0 added [ 58.598194][ T8182] team0: Port device team_slave_1 added [ 58.609800][ T8174] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.629829][ T8186] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.637182][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.644744][ T8186] device bridge_slave_0 entered promiscuous mode [ 58.657814][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.669041][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.676775][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.685216][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.693937][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.701286][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.709352][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.722772][ T8184] chnl_net:caif_netlink_parms(): no params data found [ 58.740826][ T8186] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.748737][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.757576][ T8186] device bridge_slave_1 entered promiscuous mode [ 58.838476][ T8182] device hsr_slave_0 entered promiscuous mode [ 58.876201][ T8182] device hsr_slave_1 entered promiscuous mode [ 58.915778][ T8182] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.988458][ T8180] device hsr_slave_0 entered promiscuous mode [ 59.016035][ T8180] device hsr_slave_1 entered promiscuous mode [ 59.065778][ T8180] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.089634][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.098342][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.106971][ T8190] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.114096][ T8190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.123107][ T8186] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.145846][ T8184] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.152944][ T8184] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.162233][ T8184] device bridge_slave_0 entered promiscuous mode [ 59.171315][ T8184] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.178426][ T8184] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.186763][ T8184] device bridge_slave_1 entered promiscuous mode [ 59.212293][ T8186] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.238849][ T8186] team0: Port device team_slave_0 added [ 59.248580][ T2893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.266469][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.275392][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.284078][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.293739][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.302717][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.311267][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.319548][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.327856][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.336238][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.358564][ T8186] team0: Port device team_slave_1 added [ 59.365275][ T8184] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.387493][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.399600][ T8182] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 59.428157][ T8184] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.438948][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.461152][ T8180] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 59.497448][ T8182] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 59.551354][ T8182] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 59.608630][ T8182] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 59.697377][ T8186] device hsr_slave_0 entered promiscuous mode [ 59.746556][ T8186] device hsr_slave_1 entered promiscuous mode [ 59.786176][ T8186] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.794215][ T8180] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 59.854194][ T8177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.863829][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 59.871381][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.881094][ T8174] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.894078][ T8180] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 59.948537][ T8180] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 59.989702][ T8184] team0: Port device team_slave_0 added [ 59.997721][ T8184] team0: Port device team_slave_1 added [ 60.019812][ T2893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.027938][ T2893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.068676][ T8184] device hsr_slave_0 entered promiscuous mode [ 60.126178][ T8184] device hsr_slave_1 entered promiscuous mode [ 60.205967][ T8184] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.216912][ T8177] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.271472][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.280926][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.290182][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.297292][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.327999][ T8186] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 60.359448][ T8186] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 165.385662][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 165.392819][ C1] rcu: 1-...!: (10499 ticks this GP) idle=8fe/1/0x4000000000000002 softirq=11443/11443 fqs=1 [ 165.403754][ C1] (t=10501 jiffies g=6341 q=103) [ 165.408787][ C1] rcu: rcu_preempt kthread starved for 10500 jiffies! g6341 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 165.420428][ C1] rcu: RCU grace-period kthread stack dump: [ 165.426414][ C1] rcu_preempt R running task 29104 10 2 0x80004000 [ 165.435534][ C1] Call Trace: [ 165.438837][ C1] __schedule+0x9a0/0xcc0 [ 165.443351][ C1] schedule+0x181/0x210 [ 165.447507][ C1] schedule_timeout+0x14f/0x240 [ 165.452522][ C1] ? run_local_timers+0x120/0x120 [ 165.457543][ C1] rcu_gp_kthread+0xed8/0x1770 [ 165.462573][ C1] kthread+0x332/0x350 [ 165.466626][ C1] ? rcu_report_qs_rsp+0x140/0x140 [ 165.471819][ C1] ? kthread_blkcg+0xe0/0xe0 [ 165.476401][ C1] ret_from_fork+0x24/0x30 [ 165.480826][ C1] NMI backtrace for cpu 1 [ 165.485281][ C1] CPU: 1 PID: 8174 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 165.493850][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.504239][ C1] Call Trace: [ 165.507514][ C1] [ 165.510392][ C1] dump_stack+0x1fb/0x318 [ 165.514734][ C1] nmi_cpu_backtrace+0xaf/0x1a0 [ 165.519752][ C1] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 165.525914][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 165.533007][ C1] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 165.539060][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 165.545197][ C1] rcu_dump_cpu_stacks+0x15a/0x220 [ 165.550997][ C1] rcu_sched_clock_irq+0xe25/0x1ad0 [ 165.556642][ C1] ? trace_hardirqs_off+0x74/0x80 [ 165.561655][ C1] update_process_times+0x12d/0x180 [ 165.566931][ C1] tick_sched_timer+0x263/0x420 [ 165.571771][ C1] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 165.577305][ C1] __hrtimer_run_queues+0x403/0x840 [ 165.582534][ C1] hrtimer_interrupt+0x38c/0xda0 [ 165.587473][ C1] ? debug_smp_processor_id+0x9/0x20 [ 165.592762][ C1] smp_apic_timer_interrupt+0x109/0x280 [ 165.598297][ C1] apic_timer_interrupt+0xf/0x20 [ 165.603228][ C1] [ 165.606523][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x48/0x50 [ 165.612757][ C1] Code: 80 13 00 00 83 fa 02 75 21 48 8b 91 88 13 00 00 48 8b 32 48 8d 7e 01 8b 89 84 13 00 00 48 39 cf 73 08 48 89 44 f2 08 48 89 3a 0f 1f 80 00 00 00 00 4c 8b 04 24 65 48 8b 04 25 c0 1d 02 00 65 [ 165.632779][ C1] RSP: 0018:ffffc90002247b98 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 165.641351][ C1] RAX: ffffffff81487326 RBX: ffffea0002326a80 RCX: ffff8880a70de2c0 [ 165.649323][ C1] RDX: 0000000000000000 RSI: 00000000fffffffc RDI: ffffea0002326a80 [ 165.657395][ C1] RBP: ffffc90002247bc0 R08: 000000000003a768 R09: ffffed1012689eaf [ 165.665525][ C1] R10: ffffed1012689eaf R11: 0000000000000000 R12: ffff8880943fe420 [ 165.673485][ C1] R13: dffffc0000000000 R14: 00000000fffffffc R15: ffff88809344f568 [ 165.681454][ C1] ? mod_memcg_page_state+0x16/0x190 [ 165.686731][ C1] ? free_thread_stack+0x124/0x590 [ 165.691839][ C1] ? mod_memcg_page_state+0x16/0x190 [ 165.697109][ C1] free_thread_stack+0x168/0x590 [ 165.702035][ C1] put_task_stack+0xa3/0x130 [ 165.706610][ C1] finish_task_switch+0x3f1/0x550 [ 165.711625][ C1] __schedule+0x9a8/0xcc0 [ 165.715949][ C1] schedule+0x181/0x210 [ 165.720091][ C1] do_nanosleep+0x1d0/0x6c0 [ 165.724591][ C1] hrtimer_nanosleep+0x3a6/0x5b0 [ 165.729621][ C1] ? trace_hrtimer_expire_exit+0x2d0/0x2d0 [ 165.735414][ C1] __x64_sys_nanosleep+0x186/0x1d0 [ 165.740516][ C1] do_syscall_64+0xf7/0x1c0 [ 165.745007][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.750883][ C1] RIP: 0033:0x458b20 [ 165.754871][ C1] Code: c0 5b 5d c3 66 0f 1f 44 00 00 8b 04 24 48 83 c4 18 5b 5d c3 66 0f 1f 44 00 00 83 3d 11 fe 61 00 00 75 14 b8 23 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 d4 d1 fb ff c3 48 83 ec 08 e8 ea 46 00 00 [ 165.774458][ C1] RSP: 002b:00007ffcd0e7c448 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 [ 165.782879][ C1] RAX: ffffffffffffffda RBX: 000000000000ebc1 RCX: 0000000000458b20 [ 165.790863][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffcd0e7c450 [ 165.798830][ C1] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000000d96940 [ 165.806798][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.814759][ C1] R13: 00007ffcd0e7c4a0 R14: 000000000000ebba R15: 00007ffcd0e7c4b0