[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 46.499571][ T25] audit: type=1800 audit(1575447140.229:25): pid=8134 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 46.518917][ T25] audit: type=1800 audit(1575447140.239:26): pid=8134 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 46.567809][ T25] audit: type=1800 audit(1575447140.239:27): pid=8134 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.129' (ECDSA) to the list of known hosts. 2019/12/04 08:12:31 fuzzer started 2019/12/04 08:12:32 dialing manager at 10.128.0.26:36481 2019/12/04 08:12:32 syscalls: 2691 2019/12/04 08:12:32 code coverage: enabled 2019/12/04 08:12:32 comparison tracing: enabled 2019/12/04 08:12:32 extra coverage: extra coverage is not supported by the kernel 2019/12/04 08:12:32 setuid sandbox: enabled 2019/12/04 08:12:32 namespace sandbox: enabled 2019/12/04 08:12:32 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/04 08:12:32 fault injection: enabled 2019/12/04 08:12:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/04 08:12:32 net packet injection: enabled 2019/12/04 08:12:32 net device setup: enabled 2019/12/04 08:12:32 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/04 08:12:32 devlink PCI setup: PCI device 0000:00:10.0 is not available 08:12:33 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x100d}}) 08:12:33 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000003c0)={0x2, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeedcafe}}) syzkaller login: [ 59.862579][ T8300] IPVS: ftp: loaded support on port[0] = 21 [ 59.994013][ T8300] chnl_net:caif_netlink_parms(): no params data found [ 60.044901][ T8300] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.053216][ T8300] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.061437][ T8300] device bridge_slave_0 entered promiscuous mode [ 60.072089][ T8300] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.079376][ T8300] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.089295][ T8300] device bridge_slave_1 entered promiscuous mode [ 60.117952][ T8300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.130449][ T8300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:12:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) [ 60.166496][ T8303] IPVS: ftp: loaded support on port[0] = 21 [ 60.183088][ T8300] team0: Port device team_slave_0 added [ 60.193891][ T8300] team0: Port device team_slave_1 added 08:12:34 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000805000), 0xfe55) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r2, 0x0) recvfrom$packet(r1, &(0x7f0000000080)=""/240, 0xf0, 0x0, 0x0, 0x0) [ 60.344678][ T8300] device hsr_slave_0 entered promiscuous mode [ 60.382581][ T8300] device hsr_slave_1 entered promiscuous mode [ 60.507279][ T8305] IPVS: ftp: loaded support on port[0] = 21 [ 60.645446][ T8300] netdevsim netdevsim0 netdevsim0: renamed from eth0 08:12:34 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) accept(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) preadv(r3, 0x0, 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@v1={0x2, "a2bb258ccf82556be0b66a07ccbca448"}, 0x11, 0x2) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) chown(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {&(0x7f00000005c0)="ee1549d712ab06cc3264f3f7b65ee0a5177cb2c3b702132b5c9dc70ca217f49832c9202103fb6551a274dbdc660172e55de185aef4c79d4c1fd83e69e4cac97e380ad2255db3bc3c89bebf011b65dcae5110f68d921e54ac712ad806ad1f9460dec3853c262ae3d0597aa65d05ca2f28472a958561dd08caf3e3020cb42a3f280083e9003f677b262f324937051ba6b8c1798f171fa7c5363b63b4b30f95cfb7cb94f464acc6650129c350f2cc55b39c4184d092816bbd7ddf69d1cfb720d1a75302f61a", 0xc4}, {&(0x7f00000003c0)="5d58654d6344c8b98a7107c2638600fc486f22d04437b1b7609bbf4753f41f9e986425e39c38c9f990a1ef306dd6726ddfe6c762b6e809199520ca31e750184a1ea2db700df1d9120df99e3499f6010289730c1532e833ca1cb39829", 0x5c}, {&(0x7f0000000700)="22af1e8301603b6d8d5afe6ccbb7a4ac67c9038b5421194f3ae3df081097945c45ec90c0ccda577e340b0c5f880a9ce293722cb9e34caac7c2879898bfa60b8d92a6ba60971526a4bdbc6aa1f115d06484bb580c6af767aa915fc9ba9a374c5c542966edfa6b507918aeea48e40172ca1497703f369fde0fce740aa02ac55e951b521b6f79311f2a581e8979a02d8ba305003e4b89bde0fa80c44f6bec3acda24eeeb81816d2e084fec41d5fb9823aa0ffcb0afe9e3fc3fcde8e6938858c", 0xbe}, {&(0x7f00000007c0)="f6b895a6adc3c2d467f5010eab432cd1b99df673120f083df9a3aed6e5602df60c3289b6", 0x24}], 0x5, &(0x7f00000008c0)=ANY=[@ANYBLOB="200000000000000029000000370000002bffc0ba180223b5c701000000000000280000000000000000000009370000000001000000000000010200000103000000c2040000000900"], 0x48}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000005a00), 0x0, 0x0) [ 60.709488][ T8307] IPVS: ftp: loaded support on port[0] = 21 [ 60.727167][ T8300] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 60.784506][ T8300] netdevsim netdevsim0 netdevsim2: renamed from eth2 08:12:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x6, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000077000000978402bb908b84ed88e6ddfdc74df6448b6679a76bd4c2f5845c40d154a51f2ca2409f55fde10dd920fb7f000000000000c4f64cbf46fdacd6f28a0c7925063298d51daa5452ae0b7a55657d747d9492f313611a8254121f973e13fa90ddbb4318bf709eb5b60d0bb239eb306ccf13a7e5a4d258ae2c00080086fe91aa8965daced73e90c5ed2b81a35661ad50343123595676f72517bb269f30331747bb66879a487e50ac6dd71274948b119c773c2dfd64a50e94e9e6a85a6faca4a635d480c3ea199d140330f063d77514b08bf696856613010c863d38442c2648ce3cbc49b65027a5a06bf21fefc7c8199c0012db8db312b34211c4a4452919103f4163cd9d1759b08fc4110d1758674d009c47eac897e5448a20feffceaa7a3122c0abac30707e"]) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x3) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xffa8) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x7e}) [ 60.884714][ T8300] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 60.931454][ T8300] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.939047][ T8300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.947578][ T8300] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.954718][ T8300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.985513][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.998277][ T8310] IPVS: ftp: loaded support on port[0] = 21 [ 61.007332][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.047121][ T8303] chnl_net:caif_netlink_parms(): no params data found [ 61.094081][ T8305] chnl_net:caif_netlink_parms(): no params data found [ 61.160905][ T8313] IPVS: ftp: loaded support on port[0] = 21 [ 61.170972][ T8303] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.179602][ T8303] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.188403][ T8303] device bridge_slave_0 entered promiscuous mode [ 61.198570][ T8303] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.205754][ T8303] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.214182][ T8303] device bridge_slave_1 entered promiscuous mode [ 61.240869][ T8305] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.249943][ T8305] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.258962][ T8305] device bridge_slave_0 entered promiscuous mode [ 61.268851][ T8305] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.276078][ T8305] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.284282][ T8305] device bridge_slave_1 entered promiscuous mode [ 61.306914][ T8303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.332687][ T8303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.364562][ T8305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.390316][ T8300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.412610][ T8305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.438054][ T8305] team0: Port device team_slave_0 added [ 61.446370][ T8303] team0: Port device team_slave_0 added [ 61.454222][ T8303] team0: Port device team_slave_1 added [ 61.533678][ T8303] device hsr_slave_0 entered promiscuous mode [ 61.572059][ T8303] device hsr_slave_1 entered promiscuous mode [ 61.621920][ T8303] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.632715][ T8305] team0: Port device team_slave_1 added [ 61.696053][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.705054][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.744780][ T8305] device hsr_slave_0 entered promiscuous mode [ 61.802323][ T8305] device hsr_slave_1 entered promiscuous mode [ 61.842272][ T8305] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.874393][ T8300] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.888769][ T8310] chnl_net:caif_netlink_parms(): no params data found [ 61.947091][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.956412][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.966114][ T3002] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.973493][ T3002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.983311][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.992337][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.000780][ T3002] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.007927][ T3002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.018872][ T8307] chnl_net:caif_netlink_parms(): no params data found [ 62.089882][ T8303] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 62.165828][ T8305] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 62.243555][ T8313] chnl_net:caif_netlink_parms(): no params data found [ 62.256577][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.265877][ T8303] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 62.315425][ T8303] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 62.354551][ T8305] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 62.420486][ T8305] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 62.474470][ T8310] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.482298][ T8310] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.490484][ T8310] device bridge_slave_0 entered promiscuous mode [ 62.498705][ T8307] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.506184][ T8307] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.514583][ T8307] device bridge_slave_0 entered promiscuous mode [ 62.523286][ T8303] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 62.570904][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.581029][ T8305] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 62.633963][ T8310] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.641195][ T8310] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.649363][ T8310] device bridge_slave_1 entered promiscuous mode [ 62.656707][ T8307] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.664461][ T8307] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.673374][ T8307] device bridge_slave_1 entered promiscuous mode [ 62.719243][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.731720][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.741079][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.752654][ T8307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.762404][ T8313] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.769680][ T8313] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.778543][ T8313] device bridge_slave_0 entered promiscuous mode [ 62.786821][ T8313] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.794267][ T8313] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.802324][ T8313] device bridge_slave_1 entered promiscuous mode [ 62.819793][ T8300] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 62.830785][ T8300] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.849777][ T8307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.887710][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.896941][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.907820][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.916700][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.926242][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.935020][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.943722][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.958249][ T8310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.972028][ T8310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.987363][ T8307] team0: Port device team_slave_0 added [ 62.997043][ T8313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.026041][ T8310] team0: Port device team_slave_0 added [ 63.036057][ T8307] team0: Port device team_slave_1 added [ 63.083766][ T8307] device hsr_slave_0 entered promiscuous mode [ 63.122234][ T8307] device hsr_slave_1 entered promiscuous mode [ 63.162171][ T8307] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.174001][ T8313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.201100][ T8310] team0: Port device team_slave_1 added [ 63.244874][ T8313] team0: Port device team_slave_0 added [ 63.251810][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.259362][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.279542][ T8305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.324584][ T8310] device hsr_slave_0 entered promiscuous mode [ 63.393357][ T8310] device hsr_slave_1 entered promiscuous mode [ 63.431985][ T8310] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.440725][ T8313] team0: Port device team_slave_1 added [ 63.453613][ T8300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.495795][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.503903][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.519207][ T8305] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.564820][ T8313] device hsr_slave_0 entered promiscuous mode [ 63.602338][ T8313] device hsr_slave_1 entered promiscuous mode [ 63.641756][ T8313] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.659055][ T8303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.666121][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.675224][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.684500][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.692163][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.706423][ T8310] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 63.754304][ T8310] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 168.781511][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 168.788337][ C1] rcu: 1-...!: (10499 ticks this GP) idle=412/1/0x4000000000000002 softirq=11250/11254 fqs=39 [ 168.798929][ C1] (t=10500 jiffies g=6425 q=81) [ 168.803867][ C1] rcu: rcu_preempt kthread starved for 10421 jiffies! g6425 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 168.814959][ C1] rcu: RCU grace-period kthread stack dump: [ 168.820835][ C1] rcu_preempt R running task 29032 10 2 0x80004000 [ 168.828722][ C1] Call Trace: [ 168.832008][ C1] __schedule+0x9a0/0xcc0 [ 168.836331][ C1] schedule+0x181/0x210 [ 168.840473][ C1] schedule_timeout+0x14f/0x240 [ 168.845310][ C1] ? run_local_timers+0x120/0x120 [ 168.850325][ C1] rcu_gp_kthread+0xed8/0x1770 [ 168.856735][ C1] kthread+0x332/0x350 [ 168.860787][ C1] ? rcu_report_qs_rsp+0x140/0x140 [ 168.865883][ C1] ? kthread_blkcg+0xe0/0xe0 [ 168.870465][ C1] ret_from_fork+0x24/0x30 [ 168.874883][ C1] NMI backtrace for cpu 1 [ 168.879205][ C1] CPU: 1 PID: 8323 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 168.887421][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.897471][ C1] Call Trace: [ 168.900740][ C1] [ 168.903583][ C1] dump_stack+0x1fb/0x318 [ 168.907904][ C1] nmi_cpu_backtrace+0xaf/0x1a0 [ 168.912912][ C1] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 168.919141][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 168.925196][ C1] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 168.931165][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 168.937140][ C1] rcu_dump_cpu_stacks+0x15a/0x220 [ 168.942242][ C1] rcu_sched_clock_irq+0xe25/0x1ad0 [ 168.947435][ C1] ? trace_hardirqs_off+0x74/0x80 [ 168.952451][ C1] update_process_times+0x12d/0x180 [ 168.957641][ C1] tick_sched_timer+0x263/0x420 [ 168.962477][ C1] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 168.968007][ C1] __hrtimer_run_queues+0x403/0x840 [ 168.973209][ C1] hrtimer_interrupt+0x38c/0xda0 [ 168.978159][ C1] ? debug_smp_processor_id+0x9/0x20 [ 168.983439][ C1] smp_apic_timer_interrupt+0x109/0x280 [ 168.988982][ C1] apic_timer_interrupt+0xf/0x20 [ 168.993915][ C1] [ 168.996843][ C1] RIP: 0010:free_thread_stack+0x133/0x590 [ 169.002549][ C1] Code: 00 ea ff ff 48 01 c7 be 03 00 00 00 e8 f6 9e 60 00 e9 5d 04 00 00 e8 dc 2a 2e 00 48 89 df 31 f6 e8 a2 a1 6e 00 43 80 3c 2e 00 <74> 08 4c 89 e7 e8 43 a0 69 00 49 8b 1c 24 48 83 c3 08 48 89 d8 48 [ 169.022141][ C1] RSP: 0018:ffffc90002307598 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 169.030539][ C1] RAX: 0000000000000001 RBX: ffffea000298de80 RCX: 0000000000000000 [ 169.038525][ C1] RDX: ffffc90001fa9000 RSI: 0000000000000000 RDI: ffffea000298de80 [ 169.046483][ C1] RBP: ffffc900023075d0 R08: 000000000003a728 R09: ffffed10150936a7 [ 169.054444][ C1] R10: ffffed10150936a7 R11: 0000000000000000 R12: ffff888093fa4620 [ 169.062578][ C1] R13: dffffc0000000000 R14: 1ffff110127f48c4 R15: ffff8880a849b528 [ 169.070572][ C1] ? free_thread_stack+0x12e/0x590 [ 169.075701][ C1] put_task_stack+0xa3/0x130 [ 169.080291][ C1] finish_task_switch+0x3f1/0x550 [ 169.085317][ C1] __schedule+0x9a8/0xcc0 [ 169.089655][ C1] preempt_schedule_irq+0xc1/0x140 [ 169.094765][ C1] retint_kernel+0x1b/0x2b [ 169.099174][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x50 [ 169.105236][ C1] Code: 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 53 48 89 fb e8 13 00 00 00 48 8b 3d f4 3c cd 07 48 89 de e8 d4 01 3b 00 5b 5d c3 cc <48> 8b 04 24 65 48 8b 0c 25 c0 1d 02 00 65 8b 15 38 84 8b 7e f7 c2 [ 169.124826][ C1] RSP: 0018:ffffc900023077e8 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 [ 169.133222][ C1] RAX: ffff8880a55ac040 RBX: 0000000000000001 RCX: 0000000000000002 [ 169.141181][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 169.149143][ C1] RBP: ffffc90002307848 R08: ffffffff8354fe7c R09: ffffed1013450e37 [ 169.157102][ C1] R10: ffffed1013450e37 R11: 0000000000000000 R12: 0000000000000001 [ 169.165065][ C1] R13: 00000000000008e0 R14: ffff88809a287180 R15: dffffc0000000000 [ 169.173035][ C1] ? tomoyo_check_acl+0x2dc/0x3a0 [ 169.178049][ C1] ? tomoyo_check_acl+0x2e5/0x3a0 [ 169.183053][ C1] ? tomoyo_execute_permission+0x3f0/0x3f0 [ 169.188853][ C1] tomoyo_check_open_permission+0x3ce/0x9d0 [ 169.194763][ C1] tomoyo_file_open+0x141/0x190 [ 169.199606][ C1] security_file_open+0x65/0x2f0 [ 169.204585][ C1] do_dentry_open+0x351/0x10c0 [ 169.209346][ C1] vfs_open+0x73/0x80 [ 169.213319][ C1] path_openat+0x1397/0x44a0 [ 169.217932][ C1] do_filp_open+0x192/0x3d0 [ 169.222442][ C1] do_sys_open+0x29f/0x560 [ 169.226851][ C1] __x64_sys_open+0x87/0x90 [ 169.231340][ C1] do_syscall_64+0xf7/0x1c0 [ 169.235835][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.241713][ C1] RIP: 0033:0x414411 [ 169.245596][ C1] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 169.265184][ C1] RSP: 002b:00007f6d4858f7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 169.273582][ C1] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000414411 [ 169.281564][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f6d4858f850 [ 169.289679][ C1] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 169.297659][ C1] R10: 00007f6d485909d0 R11: 0000000000000293 R12: 00007f6d485906d4 [ 169.305626][ C1] R13: 00000000004caefe R14: 00000000004e4470 R15: 00000000ffffffff