[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 48.575927][ T23] audit: type=1800 audit(1575434938.527:25): pid=8292 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 48.615386][ T23] audit: type=1800 audit(1575434938.527:26): pid=8292 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 48.655423][ T23] audit: type=1800 audit(1575434938.527:27): pid=8292 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.178' (ECDSA) to the list of known hosts. 2019/12/04 04:49:09 fuzzer started 2019/12/04 04:49:11 dialing manager at 10.128.0.26:42111 2019/12/04 04:49:11 syscalls: 2689 2019/12/04 04:49:11 code coverage: enabled 2019/12/04 04:49:11 comparison tracing: enabled 2019/12/04 04:49:11 extra coverage: extra coverage is not supported by the kernel 2019/12/04 04:49:11 setuid sandbox: enabled 2019/12/04 04:49:11 namespace sandbox: enabled 2019/12/04 04:49:11 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/04 04:49:11 fault injection: enabled 2019/12/04 04:49:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/04 04:49:11 net packet injection: enabled 2019/12/04 04:49:11 net device setup: enabled 2019/12/04 04:49:11 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/04 04:49:11 devlink PCI setup: PCI device 0000:00:10.0 is not available 04:49:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x19, 0x4, 0x4, 0x2}, 0x3c) 04:49:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) signalfd(r0, &(0x7f0000000200)={0x2}, 0x8) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84c46ab6098d85) r1 = getegid() sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) r2 = geteuid() mount$fuse(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize'}}], [{@uid_eq={'uid'}}, {@fowner_eq={'fowner'}}, {@euid_eq={'euid', 0x3d, r2}}]}}) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000c00)={0x8, 0x120, 0xfa00, {0x4, {0x4, 0xc67, "bad0f230b19f36bfff5b4e24a20fd09ad189b8a90e8266d93cfcb5c967d467821457e29dc64554534b8b0a855b1d696ed58a3359c9807d633d56e456a3f7281f25f67f0ec48c35d85a628df0f73f75cf1216d66f5d1f9b82c89b3874e81241747e663fa440660192e20424fc591d3bf2a0dd4dbe381e2c3c7d4e396616a5ed28c070ad54eddc9e85423725c6c86ab2b1b9516efed520932f308e713c246d7a0b484711443f2da0847c86e3e5c4c0c5b9fba1d0ba3c6d1929ec25ab03545fadc37a049ad65ad36ddfd0d577578688c2d29930424066b87f79d652e3a9692167bc6540790145d6dd2e1509518b1624f648918823716ab584ea29b0205be69043e0", 0x0, 0x0, 0x9, 0x0, 0x96, 0x0, 0x8d}}}, 0x128) stat(0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000140), &(0x7f0000000bc0)=0x4) ftruncate(0xffffffffffffffff, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x4300000000000000, 0x0) syzkaller login: [ 63.193356][ T8458] IPVS: ftp: loaded support on port[0] = 21 04:49:13 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000080)=0x10000000002) syz_open_pts(0xffffffffffffffff, 0x0) socket$isdn_base(0x22, 0x3, 0x0) process_vm_writev(0x0, &(0x7f0000c22000)=[{0x0}], 0x1, &(0x7f0000c22fa0), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000001c0)) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$pptp(0x18, 0x1, 0x2) r9 = open(0x0, 0x0, 0x0) getdents64(r9, 0x0, 0x600) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x0, 0x0, 0x0, 0x4040040}, 0x4000000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r10 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getegid() sendmmsg$unix(r9, &(0x7f0000000ec0)=[{&(0x7f0000000600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000680)="edeb45a6f7243ea5942b31ca24ee3be5171194a8906847cc7a828998c9d891ac87d53b1ac1d1653e2cfa25ebeff6ee329fe25becc79ebb58", 0x38}, {&(0x7f00000002c0)}, {&(0x7f0000000700)="821cbca9a9a50fe2b5f7dd2f9fda162ecdd9509fc2dab0f8859580a21fd4977f40dd194c765657", 0x27}, {&(0x7f0000000740)="6b2fdeeaea0d18f4cfb62b4e908f367f684e3e25d3dad878224bb32bbbf8806f3d284a26b0da6d5ad3a3b88c33fef1aa0be244", 0x33}], 0x4, &(0x7f00000008c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [r8]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90, 0x4000000}, {&(0x7f00000009c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000a40)="b2aee10efaa7425efbf124b583d6fb143c5304c57228", 0x16}], 0x1, &(0x7f0000000dc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r7, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff]}}], 0x90, 0xbfecbd20c6d21766}], 0x2, 0x2) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 0xee01, 0x80}, 0xa99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}) gettid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast2, @in6=@remote}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000340)=0xe8) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) r11 = open(0x0, 0x0, 0x0) getdents64(r11, 0x0, 0x600) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) sendmsg$netlink(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)={0x198, 0x32, 0x20, 0x70bd27, 0x25dfdbff, "", [@nested={0x188, 0x92, [@generic="c0a8c54417b6eeda5f6c07025318dff43a04c763b66f89789b33556914d407685f08d406162bf2e9226fb301707103170cd5d825d694b46ab459197732dd4dbc8d86cdae03bd4f4d169c7a8c3aabc050818ea22ef11105a59162d2f0fd7a195f825dddf8b62cf70559ac237a5311c457e33fc02b95f7ba9586e10768b58b1f490b3ae8a6c573a4c7e15829ed7b01367db269a6ec1e3635871f31f3c76f588256839969761448c9de4876504735e0893ed8ad726695b1c9a201af86977c6072bcd05edb645c287ae716181985497b7fdb6b2da5faba6d4622e9", @typed={0x8, 0x0, @fd}, @typed={0x8, 0x2a, @pid=r6}, @generic="f8733e50cb4b34d1a47b6c30e024741a09cc153398dd2066552d41d764571c5e861c9e73573dd6483269a18d159d98028dfd3c4fa236589dceca14882f8bc8e2ad4f99cec6a365ba1632d673f43f69fda245e0f57a4f17e9ea7dc20d548ce127dec4cdc47891219f5090c922fda106d6023925db3f4363a4efa2fe42577a2b642fdbb72f4b162c8eba30f7dfe264447cdb9b0320e28f86eb8ff9"]}]}, 0x198}], 0x1, &(0x7f0000000580)=[@cred={{0x1c, 0x1, 0x2, {r0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60, 0x2800}, 0x4010400) [ 63.354998][ T8458] chnl_net:caif_netlink_parms(): no params data found [ 63.414456][ T8458] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.416067][ T8461] IPVS: ftp: loaded support on port[0] = 21 [ 63.427831][ T8458] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.437122][ T8458] device bridge_slave_0 entered promiscuous mode [ 63.446268][ T8458] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.453619][ T8458] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.463189][ T8458] device bridge_slave_1 entered promiscuous mode [ 63.503100][ T8458] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.532375][ T8458] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.588891][ T8458] team0: Port device team_slave_0 added [ 63.621755][ T8458] team0: Port device team_slave_1 added 04:49:13 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0xb, 0x0, 0x20000000001009}, 0xf) [ 63.675998][ T8463] IPVS: ftp: loaded support on port[0] = 21 [ 63.749053][ T8458] device hsr_slave_0 entered promiscuous mode 04:49:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x0, 0x0, 0x2000000000903, 0x1}, 0x20) close(r1) [ 63.895653][ T8458] device hsr_slave_1 entered promiscuous mode [ 63.959061][ T8466] IPVS: ftp: loaded support on port[0] = 21 [ 64.008647][ T8461] chnl_net:caif_netlink_parms(): no params data found [ 64.080152][ T8458] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 64.096040][ T8468] IPVS: ftp: loaded support on port[0] = 21 04:49:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x18}, [@ldst={0x6, 0x3, 0x2}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) [ 64.161063][ T8458] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 64.245783][ T8458] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 64.308251][ T8458] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 64.393351][ T8470] IPVS: ftp: loaded support on port[0] = 21 [ 64.399437][ T8458] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.406686][ T8458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.414511][ T8458] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.421901][ T8458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.432588][ T8461] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.441745][ T8461] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.449778][ T8461] device bridge_slave_0 entered promiscuous mode [ 64.459288][ T8461] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.466457][ T8461] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.474234][ T8461] device bridge_slave_1 entered promiscuous mode [ 64.487595][ T3743] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.495856][ T3743] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.570956][ T8461] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.591325][ T8461] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.617100][ T8461] team0: Port device team_slave_0 added [ 64.625934][ T8461] team0: Port device team_slave_1 added [ 64.631724][ T8463] chnl_net:caif_netlink_parms(): no params data found [ 64.687096][ T8461] device hsr_slave_0 entered promiscuous mode [ 64.745626][ T8461] device hsr_slave_1 entered promiscuous mode [ 64.785470][ T8461] debugfs: Directory 'hsr0' with parent '/' already present! [ 64.831389][ T8466] chnl_net:caif_netlink_parms(): no params data found [ 64.874570][ T8463] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.883071][ T8463] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.892896][ T8463] device bridge_slave_0 entered promiscuous mode [ 64.904736][ T8463] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.911988][ T8463] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.920366][ T8463] device bridge_slave_1 entered promiscuous mode [ 64.948881][ T8463] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.961902][ T8463] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.983625][ T8458] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.991355][ T8466] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.998573][ T8466] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.007284][ T8466] device bridge_slave_0 entered promiscuous mode [ 65.026840][ T8466] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.033906][ T8466] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.041840][ T8466] device bridge_slave_1 entered promiscuous mode [ 65.060016][ T8461] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 65.104742][ T8463] team0: Port device team_slave_0 added [ 65.118625][ T8461] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 65.158265][ T8461] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 65.198109][ T8461] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 65.268268][ T8463] team0: Port device team_slave_1 added [ 65.277872][ T8466] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.289317][ T8466] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.336803][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.345110][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.356011][ T8458] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.381346][ T8466] team0: Port device team_slave_0 added [ 65.397721][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.406719][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.415079][ T3743] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.422189][ T3743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.429851][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.438627][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.447095][ T3743] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.454123][ T3743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.466427][ T8470] chnl_net:caif_netlink_parms(): no params data found [ 65.487077][ T8466] team0: Port device team_slave_1 added [ 65.492964][ T8468] chnl_net:caif_netlink_parms(): no params data found [ 65.508082][ T3744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.542739][ T8470] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.550564][ T8470] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.558625][ T8470] device bridge_slave_0 entered promiscuous mode [ 65.598336][ T8463] device hsr_slave_0 entered promiscuous mode [ 65.635899][ T8463] device hsr_slave_1 entered promiscuous mode [ 65.675557][ T8463] debugfs: Directory 'hsr0' with parent '/' already present! [ 65.694984][ T8470] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.703013][ T8470] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.712096][ T8470] device bridge_slave_1 entered promiscuous mode [ 65.728775][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.745531][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.754241][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.818451][ T8466] device hsr_slave_0 entered promiscuous mode [ 65.855866][ T8466] device hsr_slave_1 entered promiscuous mode [ 65.895551][ T8466] debugfs: Directory 'hsr0' with parent '/' already present! [ 65.920021][ T8470] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.932015][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.940280][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.950014][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.978843][ T8470] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.012895][ T8463] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 66.078520][ T8463] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 66.127984][ T8463] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 66.168427][ T8468] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.175809][ T8468] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.183711][ T8468] device bridge_slave_0 entered promiscuous mode [ 66.209138][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.217665][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.229824][ T8458] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.243374][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.252544][ T8463] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 66.289829][ T8468] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.299436][ T8468] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.307742][ T8468] device bridge_slave_1 entered promiscuous mode [ 66.316743][ T8470] team0: Port device team_slave_0 added [ 66.338952][ T3744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.348159][ T3744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.373461][ T8468] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.385914][ T8470] team0: Port device team_slave_1 added [ 66.392762][ T8468] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.413264][ T8458] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.448313][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.456792][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.464374][ T8466] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 66.523986][ T8466] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 66.578881][ T8466] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 66.641300][ T8461] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.687350][ T8470] device hsr_slave_0 entered promiscuous mode [ 66.735772][ T8470] device hsr_slave_1 entered promiscuous mode [ 66.795533][ T8470] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.809876][ T8468] team0: Port device team_slave_0 added [ 66.825432][ T8466] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 66.865474][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.873496][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.888505][ T8468] team0: Port device team_slave_1 added [ 66.909173][ T8461] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.958481][ T3744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.969260][ T3744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.978349][ T3744] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.985477][ T3744] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.993712][ T3744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.005272][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 172.012111][ C0] rcu: 0-...!: (10499 ticks this GP) idle=f72/1/0x4000000000000002 softirq=11291/11291 fqs=0 [ 172.022617][ C0] (t=10501 jiffies g=6809 q=111) [ 172.027633][ C0] rcu: rcu_preempt kthread starved for 10502 jiffies! g6809 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 172.038728][ C0] rcu: RCU grace-period kthread stack dump: [ 172.044605][ C0] rcu_preempt R running task 29032 10 2 0x80004000 [ 172.052505][ C0] Call Trace: [ 172.055816][ C0] __schedule+0x9a0/0xcc0 [ 172.060142][ C0] schedule+0x181/0x210 [ 172.064297][ C0] schedule_timeout+0x14f/0x240 [ 172.069140][ C0] ? run_local_timers+0x120/0x120 [ 172.074157][ C0] rcu_gp_kthread+0xed8/0x1770 [ 172.078917][ C0] kthread+0x332/0x350 [ 172.082968][ C0] ? rcu_report_qs_rsp+0x140/0x140 [ 172.088083][ C0] ? kthread_blkcg+0xe0/0xe0 [ 172.092674][ C0] ret_from_fork+0x24/0x30 [ 172.097122][ C0] NMI backtrace for cpu 0 [ 172.101447][ C0] CPU: 0 PID: 8479 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 172.109674][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.119719][ C0] Call Trace: [ 172.122992][ C0] [ 172.125837][ C0] dump_stack+0x1fb/0x318 [ 172.130157][ C0] nmi_cpu_backtrace+0xaf/0x1a0 [ 172.135008][ C0] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 172.141199][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 172.147277][ C0] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 172.153276][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 172.159173][ C0] rcu_dump_cpu_stacks+0x15a/0x220 [ 172.164279][ C0] rcu_sched_clock_irq+0xe25/0x1ad0 [ 172.169744][ C0] ? trace_hardirqs_off+0x74/0x80 [ 172.174764][ C0] update_process_times+0x12d/0x180 [ 172.179959][ C0] tick_sched_timer+0x263/0x420 [ 172.184811][ C0] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 172.190360][ C0] __hrtimer_run_queues+0x403/0x840 [ 172.195575][ C0] hrtimer_interrupt+0x38c/0xda0 [ 172.200520][ C0] ? debug_smp_processor_id+0x9/0x20 [ 172.205897][ C0] smp_apic_timer_interrupt+0x109/0x280 [ 172.211444][ C0] apic_timer_interrupt+0xf/0x20 [ 172.216393][ C0] [ 172.219356][ C0] RIP: 0010:free_thread_stack+0x11f/0x590 [ 172.225073][ C0] Code: 3e e8 e5 96 ee ff 48 c1 e8 06 48 83 e0 c0 48 bf 00 00 00 00 00 ea ff ff 48 01 c7 be 03 00 00 00 e8 06 a2 60 00 e9 5d 04 00 00 5c 2d 2e 00 48 89 df 31 f6 e8 42 af 6e 00 43 80 3c 2e 00 74 08 [ 172.244851][ C0] RSP: 0018:ffffc90002a67860 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 172.253292][ C0] RAX: 1ffff11011528d91 RBX: ffffea0002a05c40 RCX: 0000000000040000 [ 172.261276][ C0] RDX: ffffc90002129000 RSI: 000000000003ffff RDI: 0000000000040000 [ 172.269240][ C0] RBP: ffffc90002a67898 R08: dffffc0000000000 R09: fffffbfff12877ed [ 172.277230][ C0] R10: fffffbfff12877ed R11: 0000000000000000 R12: ffff88808a946d20 [ 172.285243][ C0] R13: dffffc0000000000 R14: 1ffff11011528da4 R15: ffff8880a94d3a28 [ 172.293286][ C0] put_task_stack+0xa3/0x130 [ 172.297880][ C0] finish_task_switch+0x3f1/0x550 [ 172.302948][ C0] __schedule+0x9a8/0xcc0 [ 172.308001][ C0] ? ___preempt_schedule+0x16/0x18 [ 172.313113][ C0] preempt_schedule+0xdb/0x120 [ 172.317888][ C0] ___preempt_schedule+0x16/0x18 [ 172.322822][ C0] try_to_wake_up+0xe78/0x1050 [ 172.327674][ C0] wake_up_q+0x8c/0xe0 [ 172.331748][ C0] futex_wake+0x51c/0x6f0 [ 172.336089][ C0] do_futex+0x3f5/0x3d60 [ 172.340344][ C0] ? __lock_acquire+0xc75/0x1be0 [ 172.345278][ C0] ? kcov_ioctl+0x285/0x2c0 [ 172.349773][ C0] ? __might_fault+0xf9/0x160 [ 172.354447][ C0] ? __might_fault+0xf9/0x160 [ 172.359117][ C0] ? check_preemption_disabled+0xb4/0x260 [ 172.364826][ C0] ? debug_smp_processor_id+0x9/0x20 [ 172.370105][ C0] __se_sys_futex+0x28c/0x360 [ 172.374860][ C0] ? prepare_exit_to_usermode+0x221/0x5b0 [ 172.380619][ C0] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 172.386369][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 172.391828][ C0] __x64_sys_futex+0xe5/0x100 [ 172.396521][ C0] do_syscall_64+0xf7/0x1c0 [ 172.401633][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.407543][ C0] RIP: 0033:0x45a679 [ 172.411429][ C0] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.431110][ C0] RSP: 002b:00007f0d88a9bcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 172.439520][ C0] RAX: ffffffffffffffda RBX: 000000000075bf28 RCX: 000000000045a679 [ 172.447512][ C0] RDX: 00000000004c0c65 RSI: 0000000000000081 RDI: 000000000075bf2c [ 172.455473][ C0] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 172.463432][ C0] R10: 0000000000000003 R11: 0000000000000246 R12: 000000000075bf2c [ 172.471400][ C0] R13: 00007ffeafbca5ef R14: 00007f0d88a9c9c0 R15: 000000000075bf2c