[ 37.791774][ T26] audit: type=1800 audit(1556692954.792:27): pid=7571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 37.814514][ T26] audit: type=1800 audit(1556692954.792:28): pid=7571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.623133][ T26] audit: type=1800 audit(1556692955.682:29): pid=7571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 38.649401][ T26] audit: type=1800 audit(1556692955.682:30): pid=7571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.20' (ECDSA) to the list of known hosts. 2019/05/01 06:42:42 fuzzer started 2019/05/01 06:42:46 dialing manager at 10.128.0.26:34869 2019/05/01 06:42:46 syscalls: 2440 2019/05/01 06:42:46 code coverage: enabled 2019/05/01 06:42:46 comparison tracing: enabled 2019/05/01 06:42:46 extra coverage: extra coverage is not supported by the kernel 2019/05/01 06:42:46 setuid sandbox: enabled 2019/05/01 06:42:46 namespace sandbox: enabled 2019/05/01 06:42:46 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 06:42:46 fault injection: enabled 2019/05/01 06:42:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 06:42:46 net packet injection: enabled 2019/05/01 06:42:46 net device setup: enabled 06:44:12 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000080)}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000200)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000001000)=""/174) syzkaller login: [ 135.555841][ T7738] IPVS: ftp: loaded support on port[0] = 21 [ 135.703619][ T7738] chnl_net:caif_netlink_parms(): no params data found [ 135.775699][ T7738] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.806636][ T7738] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.814848][ T7738] device bridge_slave_0 entered promiscuous mode 06:44:12 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syncfs(r1) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000480)='/dev/capi20\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) prctl$PR_SET_FPEMU(0xa, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r5) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000440)={0x0, 0x800, 0x3ff, 0xdfc}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x2, 0x0, 0xffffffffc496a437, 0x9, 0x9, 0x5, 0xd, 0x4}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) write$FUSE_BMAP(r6, &(0x7f0000000140)={0x18, 0x0, 0x7, {0x5}}, 0x18) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="737461636b203a3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289d300b06774494f1ee8ad5379dfed204dd4ee8d1bb83d594cc2086c675750d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f3"], 0x1) [ 135.828652][ T7738] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.835898][ T7738] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.844050][ T7738] device bridge_slave_1 entered promiscuous mode [ 135.872947][ T7738] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 135.884327][ T7738] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 135.909027][ T7738] team0: Port device team_slave_0 added [ 135.917459][ T7738] team0: Port device team_slave_1 added [ 136.000489][ T7738] device hsr_slave_0 entered promiscuous mode 06:44:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f000001aff4)) umount2(0x0, 0x2) [ 136.087772][ T7738] device hsr_slave_1 entered promiscuous mode [ 136.143273][ T7741] IPVS: ftp: loaded support on port[0] = 21 [ 136.158469][ T7738] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.165693][ T7738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.173606][ T7738] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.180787][ T7738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.226150][ T7743] IPVS: ftp: loaded support on port[0] = 21 06:44:13 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000200)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000001000)=""/174) [ 136.358005][ T7738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 136.403896][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.414568][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.456703][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.465507][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:44:13 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1'}, 0x30, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'.yz'}, &(0x7f0000000100), 0x102, 0xfffffffffffffffe) [ 136.553316][ T7738] 8021q: adding VLAN 0 to HW filter on device team0 [ 136.573008][ T7743] chnl_net:caif_netlink_parms(): no params data found [ 136.582513][ T7747] IPVS: ftp: loaded support on port[0] = 21 [ 136.650253][ T7741] chnl_net:caif_netlink_parms(): no params data found [ 136.661716][ T7744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.672550][ T7744] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.679694][ T7744] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.722045][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.734510][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.741656][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.769443][ T7743] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.777684][ T7743] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.796833][ T7743] device bridge_slave_0 entered promiscuous mode 06:44:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0x1}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 136.818348][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 136.832002][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 136.840849][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 136.856392][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 136.865697][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 136.878290][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.891382][ T7738] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 136.906409][ T7738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 136.924704][ T7751] IPVS: ftp: loaded support on port[0] = 21 [ 136.938506][ T7743] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.945623][ T7743] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.953645][ T7743] device bridge_slave_1 entered promiscuous mode [ 136.975056][ T7744] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 136.983927][ T7744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 136.992758][ T7744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.021798][ T7743] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 137.022651][ T7753] IPVS: ftp: loaded support on port[0] = 21 [ 137.045562][ T7741] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.054383][ T7741] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.062242][ T7741] device bridge_slave_0 entered promiscuous mode [ 137.070189][ T7741] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.077352][ T7741] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.085232][ T7741] device bridge_slave_1 entered promiscuous mode [ 137.105144][ T7743] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 137.158527][ T7741] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 137.178101][ T7743] team0: Port device team_slave_0 added [ 137.187191][ T7743] team0: Port device team_slave_1 added [ 137.197203][ T7741] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 137.224260][ T7738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 137.233682][ T7741] team0: Port device team_slave_0 added [ 137.242080][ T7741] team0: Port device team_slave_1 added [ 137.279726][ T7741] device hsr_slave_0 entered promiscuous mode [ 137.336845][ T7741] device hsr_slave_1 entered promiscuous mode [ 137.519524][ T7743] device hsr_slave_0 entered promiscuous mode [ 137.586811][ T7743] device hsr_slave_1 entered promiscuous mode [ 137.635379][ T7747] chnl_net:caif_netlink_parms(): no params data found [ 137.646615][ T7751] chnl_net:caif_netlink_parms(): no params data found [ 137.663950][ T7741] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.671139][ T7741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.678557][ T7741] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.685646][ T7741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.791252][ T2990] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.800267][ T2990] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.837904][ T7753] chnl_net:caif_netlink_parms(): no params data found [ 137.864796][ T7747] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.871906][ T7747] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.880358][ T7747] device bridge_slave_0 entered promiscuous mode [ 137.890158][ T7747] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.897318][ T7747] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.905051][ T7747] device bridge_slave_1 entered promiscuous mode [ 137.917940][ T7751] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.925062][ T7751] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.932989][ T7751] device bridge_slave_0 entered promiscuous mode [ 137.941318][ T7751] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.948830][ T7751] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.956732][ T7751] device bridge_slave_1 entered promiscuous mode [ 138.013242][ T7747] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 138.023699][ T7747] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 138.048254][ T7753] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.055391][ T7753] bridge0: port 1(bridge_slave_0) entered disabled state 06:44:15 executing program 0: r0 = socket$inet_sctp(0x2, 0x8000000000005, 0x84) connect$inet(r0, &(0x7f0000867ff0)={0xa, 0x0, @loopback}, 0x10) [ 138.063563][ T7753] device bridge_slave_0 entered promiscuous mode [ 138.082381][ T7751] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 138.106284][ T7741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.130233][ T7753] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.138298][ T7753] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.146286][ T7753] device bridge_slave_1 entered promiscuous mode [ 138.169395][ T7747] team0: Port device team_slave_0 added 06:44:15 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x100000000000600d, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) [ 138.182518][ T7751] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 138.217298][ T7743] 8021q: adding VLAN 0 to HW filter on device bond0 06:44:15 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x2) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='vlan0\x00'}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x101801, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) [ 138.233968][ T7747] team0: Port device team_slave_1 added [ 138.266276][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.283382][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.298179][ T7741] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.308686][ T7753] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 138.327012][ C1] hrtimer: interrupt took 35633 ns 06:44:15 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000200)) [ 138.451660][ T7747] device hsr_slave_0 entered promiscuous mode 06:44:15 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000200)) [ 138.497368][ T7747] device hsr_slave_1 entered promiscuous mode [ 138.532752][ T7753] bond0: Enslaving bond_slave_1 as an active interface with an up link 06:44:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000080)="0fc72f0f350f00920200f20f2dc766b9800000c00f326635004000000f3066b9800000c00f326635004000000f30baa00066ed0f01d1260f353e36f30fbd2a", 0x3f}], 0xd86, 0xfffffffffffffffc, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x8090ae81, 0x0) [ 138.544133][ T7751] team0: Port device team_slave_0 added [ 138.555209][ T7743] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.574732][ T7747] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.581874][ T7747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.594925][ T7784] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 138.615876][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.625300][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.635155][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.643621][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.650715][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.661348][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.672411][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.681164][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.688259][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.697435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.705238][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.730719][ T7788] kasan: CONFIG_KASAN_INLINE enabled [ 138.736175][ T7788] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 138.736201][ T7788] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 138.747341][ T7751] team0: Port device team_slave_1 added [ 138.751176][ T7788] CPU: 1 PID: 7788 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190430 #33 [ 138.765730][ T7788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.775808][ T7788] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 138.781537][ T7788] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 138.792339][ T7747] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.801138][ T7788] RSP: 0018:ffff8880663bfa00 EFLAGS: 00010006 [ 138.801149][ T7788] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005fe2000 [ 138.801156][ T7788] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 138.801162][ T7788] RBP: ffff8880663bfb10 R08: ffff88809b614440 R09: ffffed1015d26be0 [ 138.801169][ T7788] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff8880663c006c [ 138.801176][ T7788] R13: 0000000000000001 R14: ffff8880663c0070 R15: ffff8880663c0040 [ 138.801185][ T7788] FS: 00007f7df6831700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 138.801192][ T7788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 138.801200][ T7788] CR2: 00007f7df682f178 CR3: 000000009eca2000 CR4: 00000000001426e0 [ 138.801209][ T7788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 138.801225][ T7788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 138.816166][ T7747] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.821935][ T7788] Call Trace: [ 138.821960][ T7788] ? emulator_read_emulated+0x50/0x50 [ 138.821974][ T7788] ? lock_acquire+0x16f/0x3f0 [ 138.821995][ T7788] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 138.854395][ T7747] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 138.862873][ T7788] kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 138.862887][ T7788] ? kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 138.862906][ T7788] kvm_vcpu_ioctl+0x4dc/0xf90 [ 138.872163][ T7747] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 138.877450][ T7788] ? kvm_set_memory_region+0x50/0x50 [ 138.877467][ T7788] ? tomoyo_path_number_perm+0x263/0x520 [ 138.877489][ T7788] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 138.899535][ T7747] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 138.900078][ T7788] ? __fget+0x35a/0x550 [ 138.903441][ T7747] kobject: 'vlan0' (000000008f23daf1): kobject_add_internal: parent: 'mesh', set: '' [ 138.908703][ T7788] ? kvm_set_memory_region+0x50/0x50 [ 138.908718][ T7788] do_vfs_ioctl+0xd6e/0x1390 [ 138.908733][ T7788] ? ioctl_preallocate+0x210/0x210 [ 138.908746][ T7788] ? __fget+0x381/0x550 [ 138.908762][ T7788] ? ksys_dup3+0x3e0/0x3e0 [ 138.908777][ T7788] ? nsecs_to_jiffies+0x30/0x30 [ 138.908792][ T7788] ? tomoyo_file_ioctl+0x23/0x30 [ 138.908806][ T7788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.908821][ T7788] ? security_file_ioctl+0x93/0xc0 [ 138.908833][ T7788] ksys_ioctl+0xab/0xd0 [ 138.908846][ T7788] __x64_sys_ioctl+0x73/0xb0 [ 138.908859][ T7788] do_syscall_64+0x103/0x670 [ 138.908877][ T7788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.908887][ T7788] RIP: 0033:0x458da9 [ 138.908901][ T7788] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.908909][ T7788] RSP: 002b:00007f7df6830c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 138.908931][ T7788] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 138.908938][ T7788] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 138.908944][ T7788] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 138.908952][ T7788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7df68316d4 [ 138.908960][ T7788] R13: 00000000004c1d42 R14: 00000000004d4550 R15: 00000000ffffffff [ 138.908971][ T7788] Modules linked in: [ 138.908991][ T7788] ---[ end trace c9eaa35d3abb38d6 ]--- [ 138.909005][ T7788] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 138.909018][ T7788] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 138.909025][ T7788] RSP: 0018:ffff8880663bfa00 EFLAGS: 00010006 [ 138.909035][ T7788] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005fe2000 [ 138.909041][ T7788] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 138.909049][ T7788] RBP: ffff8880663bfb10 R08: ffff88809b614440 R09: ffffed1015d26be0 [ 138.909056][ T7788] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff8880663c006c [ 138.909063][ T7788] R13: 0000000000000001 R14: ffff8880663c0070 R15: ffff8880663c0040 [ 138.909073][ T7788] FS: 00007f7df6831700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 138.909087][ T7788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 138.966202][ T7794] kobject: 'ppp0' (000000003a6b2eba): kobject_add_internal: parent: 'net', set: 'devices' [ 138.967317][ T7788] CR2: 00007f7df682f178 CR3: 000000009eca2000 CR4: 00000000001426e0 [ 138.967327][ T7788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 138.967333][ T7788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 138.967340][ T7788] Kernel panic - not syncing: Fatal exception [ 138.968658][ T7788] Kernel Offset: disabled [ 139.274058][ T7788] Rebooting in 86400 seconds..