Warning: Permanently added '10.128.0.191' (ECDSA) to the list of known hosts. 2019/12/02 23:55:49 fuzzer started 2019/12/02 23:55:50 dialing manager at 10.128.0.26:38907 2019/12/02 23:55:50 syscalls: 2697 2019/12/02 23:55:50 code coverage: enabled 2019/12/02 23:55:50 comparison tracing: enabled 2019/12/02 23:55:50 extra coverage: extra coverage is not supported by the kernel 2019/12/02 23:55:50 setuid sandbox: enabled 2019/12/02 23:55:50 namespace sandbox: enabled 2019/12/02 23:55:50 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/02 23:55:50 fault injection: enabled 2019/12/02 23:55:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/02 23:55:50 net packet injection: enabled 2019/12/02 23:55:50 net device setup: enabled 2019/12/02 23:55:50 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/02 23:55:50 devlink PCI setup: PCI device 0000:00:10.0 is not available 23:55:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0655db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) 23:55:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) [ 62.787509][ T8465] IPVS: ftp: loaded support on port[0] = 21 23:55:52 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') read$FUSE(r1, &(0x7f0000001200), 0x1000) sendfile(r0, r1, &(0x7f00000000c0), 0x5) sendfile(r0, r1, 0x0, 0x10001) [ 62.971321][ T8465] chnl_net:caif_netlink_parms(): no params data found [ 63.006147][ T8468] IPVS: ftp: loaded support on port[0] = 21 [ 63.013379][ T8465] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.021317][ T8465] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.029541][ T8465] device bridge_slave_0 entered promiscuous mode [ 63.038498][ T8465] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.045650][ T8465] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.053644][ T8465] device bridge_slave_1 entered promiscuous mode [ 63.101910][ T8465] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.123720][ T8465] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.203869][ T8470] IPVS: ftp: loaded support on port[0] = 21 [ 63.206500][ T8465] team0: Port device team_slave_0 added [ 63.220289][ T8465] team0: Port device team_slave_1 added 23:55:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x200000) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) lseek(r3, 0x2, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x418402, 0x0) lseek(r4, 0x2, 0x0) getsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f00000006c0), &(0x7f0000000700)=0x4) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) syz_mount_image$gfs2(&(0x7f0000000340)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{&(0x7f00000003c0)="1dd9ecd814620660c2d3a94e7b43b862b70b997e793e5883dc0494070cbfe4bcb5d03c4d59df92fad3b09c113b109bc41225d1f1f377d5c8ccced507b708024c4fe9bf8940fdcea5e62513101cc65737944cae83062388e4ae16c734d0f3b62ed00b24f95ef7be73b676eafb08fb1695ef3df55fe465630020f1fce4f167e45c098884", 0x83, 0x8}], 0x400, &(0x7f0000000600)={[{@noquota='noquota'}, {@noloccookie='noloccookie'}, {@norecovery='norecovery'}, {@suiddir='suiddir'}, {@loccookie='loccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x3}}], [{@uid_eq={'uid', 0x3d, r5}}, {@audit='audit'}, {@subj_role={'subj_role', 0x3d, '/dev/snd/timer\x00'}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000100)=""/43) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) lseek(r7, 0x2, 0x0) r8 = openat(r7, &(0x7f0000000740)='./file0\x00', 0x2000, 0x91) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000780)=@assoc_value={0x0}, &(0x7f0000000180)=0xf) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/81, 0x1b, 0x51, 0x1}, 0x20) r10 = getpgid(0x0) r11 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r12 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r13 = dup2(r12, r11) writev(r13, &(0x7f0000000040)=[{&(0x7f00000002c0)='3', 0x1}], 0x1) ppoll(&(0x7f0000000200)=[{r13}], 0x1, &(0x7f0000000280), 0x0, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r17 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r17, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000ac0)=ANY=[@ANYBLOB="020000000100eb0000000000020001", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\b\x00\x00', @ANYBLOB='\b\x00\x00', @ANYRES32, @ANYBLOB="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", @ANYBLOB="74b24e1f0ef01479f571f55b37d7089c077e74b1bd50a45834473f982e6fd1fd97f815af9ca38040c073a4e24e033248357bfb5ab67092f29f0b1a66e443cc9e9ef2a93a80607607e3231fc4077092a7af7f95cd0ac29c703cc271896016d7b31ca22f3b0b56e5fec2690ec778d14906d776e06d1e11235fee66cd668482429cbe849c5b"], 0x8, 0x1) r18 = socket(0xa, 0x3, 0x8) r19 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r18, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r18, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r21 = gettid() waitid(0x83b895581628fca4, r21, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r18, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r20, @ANYRESDEC=r21]], 0xfffffffffffffe56}}, 0x20004850) r22 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r22) r23 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r23, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r23, 0x227d, &(0x7f0000000780)) kcmp(r10, r21, 0x1, r19, r23) ptrace$setopts(0x4206, r22, 0x0, 0x0) r24 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0x2}, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r22, r24, 0x0, 0xffffffffffffff4b, &(0x7f0000000180)='/dev/amidi#\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r25}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r17, 0x0, 0x1, &(0x7f0000000080)='\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r14, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r10, r13, 0x0, 0x5, &(0x7f00000000c0)='syz1\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000900)={r25}, 0xc) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000007c0)) r26 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x39cc2973, 0x2001) ioctl$UI_SET_SWBIT(r26, 0x4004556d, 0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, &(0x7f00000001c0)={r9, 0xfa, "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"}, &(0x7f0000000300)=0x102) [ 63.352708][ T8465] device hsr_slave_0 entered promiscuous mode [ 63.408817][ T8465] device hsr_slave_1 entered promiscuous mode [ 63.473178][ T8468] chnl_net:caif_netlink_parms(): no params data found [ 63.514594][ T8473] IPVS: ftp: loaded support on port[0] = 21 23:55:53 executing program 4: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x492, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r0}, &(0x7f00000000c0)=""/109, 0x6d, &(0x7f0000000180)={&(0x7f0000000140)={'wp384-generic\x00'}, 0x0, 0x2}) [ 63.644299][ T8465] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 63.681593][ T8468] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.689620][ T8468] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.697681][ T8468] device bridge_slave_0 entered promiscuous mode [ 63.720688][ T8465] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 63.764381][ T8468] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.788586][ T8468] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.796569][ T8468] device bridge_slave_1 entered promiscuous mode [ 63.816167][ T8470] chnl_net:caif_netlink_parms(): no params data found [ 63.832274][ T8465] netdevsim netdevsim0 netdevsim2: renamed from eth2 23:55:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x2040400) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r4, 0x112, 0x4, 0x0, &(0x7f00000000c0)) [ 63.900659][ T8465] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 63.993192][ T8465] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.000372][ T8465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.003922][ T8477] IPVS: ftp: loaded support on port[0] = 21 [ 64.008512][ T8465] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.020679][ T8465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.042355][ T2708] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.051028][ T2708] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.064134][ T8468] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.075552][ T8468] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.123718][ T8479] IPVS: ftp: loaded support on port[0] = 21 [ 64.136122][ T8470] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.146980][ T8470] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.155031][ T8470] device bridge_slave_0 entered promiscuous mode [ 64.165878][ T8470] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.173164][ T8470] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.182362][ T8470] device bridge_slave_1 entered promiscuous mode [ 64.196998][ T8468] team0: Port device team_slave_0 added [ 64.205272][ T8468] team0: Port device team_slave_1 added [ 64.301774][ T8468] device hsr_slave_0 entered promiscuous mode [ 64.349375][ T8468] device hsr_slave_1 entered promiscuous mode [ 64.408845][ T8468] debugfs: Directory 'hsr0' with parent '/' already present! [ 64.432426][ T8470] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.446660][ T8470] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.497268][ T8470] team0: Port device team_slave_0 added [ 64.521468][ T8473] chnl_net:caif_netlink_parms(): no params data found [ 64.537415][ T8470] team0: Port device team_slave_1 added [ 64.611260][ T8470] device hsr_slave_0 entered promiscuous mode [ 64.658975][ T8470] device hsr_slave_1 entered promiscuous mode [ 64.698615][ T8470] debugfs: Directory 'hsr0' with parent '/' already present! [ 64.714317][ T8468] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 64.771798][ T8468] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 64.847545][ T8468] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 64.880818][ T8468] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 64.962355][ T8473] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.969665][ T8473] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.977448][ T8473] device bridge_slave_0 entered promiscuous mode [ 64.985890][ T8473] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.993077][ T8473] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.000906][ T8473] device bridge_slave_1 entered promiscuous mode [ 65.034718][ T8477] chnl_net:caif_netlink_parms(): no params data found [ 65.100190][ T8465] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.111373][ T8479] chnl_net:caif_netlink_parms(): no params data found [ 65.120006][ T8470] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 65.177782][ T8473] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.189712][ T8473] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.206781][ T8470] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 65.254566][ T8470] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 65.326806][ T8470] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 65.392833][ T8477] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.400177][ T8477] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.408050][ T8477] device bridge_slave_0 entered promiscuous mode [ 65.425458][ T8473] team0: Port device team_slave_0 added [ 65.433624][ T8473] team0: Port device team_slave_1 added [ 65.444741][ T8477] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.451944][ T8477] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.460513][ T8477] device bridge_slave_1 entered promiscuous mode [ 65.490563][ T8465] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.501807][ T8477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.529919][ T8479] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.537071][ T8479] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.545367][ T8479] device bridge_slave_0 entered promiscuous mode [ 65.555347][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.564406][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.583589][ T8477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.641671][ T8473] device hsr_slave_0 entered promiscuous mode [ 65.689395][ T8473] device hsr_slave_1 entered promiscuous mode [ 65.728606][ T8473] debugfs: Directory 'hsr0' with parent '/' already present! [ 65.736334][ T8479] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.743918][ T8479] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.755413][ T8479] device bridge_slave_1 entered promiscuous mode [ 65.771104][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.781033][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.789665][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.796694][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.804617][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.814241][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.823414][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.830500][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.870024][ T8479] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.881666][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.890918][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.899690][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.908220][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.917154][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.926307][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.936216][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.945275][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.953671][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.962091][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.971755][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.985785][ T8477] team0: Port device team_slave_0 added [ 65.995207][ T8465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.005930][ T8479] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.026920][ T8477] team0: Port device team_slave_1 added [ 66.050707][ T8479] team0: Port device team_slave_0 added [ 66.077683][ T8468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.086512][ T8479] team0: Port device team_slave_1 added [ 66.098233][ T8473] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 66.131174][ T8473] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 66.182306][ T8473] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 66.247169][ T8473] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 66.330534][ T8465] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.351328][ T8468] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.392225][ T8477] device hsr_slave_0 entered promiscuous mode [ 66.450669][ T8477] device hsr_slave_1 entered promiscuous mode [ 66.489482][ T8477] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.497175][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.504739][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.514736][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.522688][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.572548][ T8479] device hsr_slave_0 entered promiscuous mode [ 66.628995][ T8479] device hsr_slave_1 entered promiscuous mode [ 66.688598][ T8479] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.722445][ T8476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.739707][ T8476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.749621][ T8476] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.756785][ T8476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.765872][ T8476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.773993][ T8476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.783483][ T8476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.793031][ T8476] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.800147][ T8476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.836239][ T8470] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.848540][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.877574][ T8479] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 171.888390][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 171.895253][ C1] rcu: 1-....: (10499 ticks this GP) idle=90e/1/0x4000000000000002 softirq=12581/12584 fqs=2784 [ 171.906028][ C1] (t=10500 jiffies g=6921 q=148) [ 171.911241][ C1] rcu: rcu_preempt kthread starved for 4912 jiffies! g6921 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 171.922239][ C1] rcu: RCU grace-period kthread stack dump: [ 171.928131][ C1] rcu_preempt R running task 29032 10 2 0x80004000 [ 171.936028][ C1] Call Trace: [ 171.939324][ C1] __schedule+0x9a0/0xcc0 [ 171.943651][ C1] schedule+0x181/0x210 [ 171.947806][ C1] schedule_timeout+0x14f/0x240 [ 171.952641][ C1] ? run_local_timers+0x120/0x120 [ 171.957660][ C1] rcu_gp_kthread+0xed8/0x1770 [ 171.962447][ C1] kthread+0x332/0x350 [ 171.966501][ C1] ? rcu_report_qs_rsp+0x140/0x140 [ 171.971599][ C1] ? kthread_blkcg+0xe0/0xe0 [ 171.976204][ C1] ret_from_fork+0x24/0x30 [ 171.980623][ C1] NMI backtrace for cpu 1 [ 171.984959][ C1] CPU: 1 PID: 8486 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 171.993200][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.003379][ C1] Call Trace: [ 172.006752][ C1] [ 172.009622][ C1] dump_stack+0x1fb/0x318 [ 172.013953][ C1] nmi_cpu_backtrace+0xaf/0x1a0 [ 172.018799][ C1] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 172.024949][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 172.031274][ C1] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 172.037245][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 172.043124][ C1] rcu_dump_cpu_stacks+0x15a/0x220 [ 172.048243][ C1] rcu_sched_clock_irq+0xe25/0x1ad0 [ 172.053432][ C1] ? trace_hardirqs_off+0x74/0x80 [ 172.058462][ C1] update_process_times+0x12d/0x180 [ 172.063666][ C1] tick_sched_timer+0x263/0x420 [ 172.068506][ C1] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 172.074042][ C1] __hrtimer_run_queues+0x403/0x840 [ 172.079245][ C1] hrtimer_interrupt+0x38c/0xda0 [ 172.084273][ C1] ? debug_smp_processor_id+0x9/0x20 [ 172.089551][ C1] smp_apic_timer_interrupt+0x109/0x280 [ 172.095084][ C1] apic_timer_interrupt+0xf/0x20 [ 172.100003][ C1] [ 172.102936][ C1] RIP: 0010:free_thread_stack+0x151/0x590 [ 172.108644][ C1] Code: 31 f6 e8 42 af 6e 00 43 80 3c 2e 00 74 08 4c 89 e7 e8 43 a4 69 00 49 8b 1c 24 48 83 c3 08 48 89 d8 48 c1 e8 03 42 80 3c 28 00 <74> 08 48 89 df e8 25 a4 69 00 48 8b 3b be fc ff ff ff e8 28 04 00 [ 172.128341][ C1] RSP: 0018:ffffc900020178e8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 172.136739][ C1] RAX: 1ffff11014a21861 RBX: ffff8880a510c308 RCX: 0000000000000000 [ 172.144696][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0002897d40 [ 172.152655][ C1] RBP: ffffc90002017920 R08: 000000000003a768 R09: fffffbfff120248a [ 172.160614][ C1] R10: fffffbfff120248a R11: 0000000000000000 R12: ffff8880a510c3a0 [ 172.168576][ C1] R13: dffffc0000000000 R14: 1ffff11014a21874 R15: ffff8880a73b5428 [ 172.176559][ C1] ? free_thread_stack+0x12e/0x590 [ 172.181663][ C1] put_task_stack+0xa3/0x130 [ 172.186245][ C1] finish_task_switch+0x3f1/0x550 [ 172.191265][ C1] __schedule+0x9a8/0xcc0 [ 172.195593][ C1] preempt_schedule_irq+0xc1/0x140 [ 172.200693][ C1] retint_kernel+0x1b/0x2b [ 172.205098][ C1] RIP: 0010:kmem_cache_alloc+0x1a8/0x2e0 [ 172.210717][ C1] Code: 8b 7d d0 57 9d 0f 1f 44 00 00 e8 83 b1 ca ff eb 1e e8 1c af ca ff 48 83 3d 7c 10 59 07 00 0f 84 33 01 00 00 48 8b 7d d0 57 9d <0f> 1f 44 00 00 41 0f 18 0e e9 21 00 00 00 89 d8 c1 e8 08 83 e0 01 [ 172.230312][ C1] RSP: 0018:ffffc90002017b38 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 172.238712][ C1] RAX: ffff888098948cd4 RBX: 0000000000000c40 RCX: ffffffff815c0597 [ 172.246670][ C1] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000286 [ 172.254629][ C1] RBP: ffffc90002017b70 R08: ffff888098948c98 R09: fffffbfff13c852e [ 172.262588][ C1] R10: fffffbfff13c852e R11: 0000000000000000 R12: ffff8882194dc380 [ 172.270720][ C1] R13: ffff8880a8b33a80 R14: ffff8880a5409040 R15: 0000000000000c40 [ 172.278694][ C1] ? mark_lock+0x107/0x1650 [ 172.283193][ C1] ? ext4_alloc_inode+0x1f/0x560 [ 172.288242][ C1] ? set_qf_name+0x3c0/0x3c0 [ 172.292865][ C1] ext4_alloc_inode+0x1f/0x560 [ 172.297649][ C1] ? set_qf_name+0x3c0/0x3c0 [ 172.302243][ C1] new_inode_pseudo+0x68/0x240 [ 172.307009][ C1] new_inode+0x28/0x1c0 [ 172.311259][ C1] ? trace_ext4_request_inode+0x28b/0x2d0 [ 172.316976][ C1] __ext4_new_inode+0x43d/0x56a0 [ 172.321909][ C1] ? memset+0x31/0x40 [ 172.325900][ C1] ext4_symlink+0x52a/0xf60 [ 172.330412][ C1] vfs_symlink+0x36f/0x4f0 [ 172.334836][ C1] do_symlinkat+0x187/0x3f0 [ 172.339332][ C1] __x64_sys_symlink+0x60/0x70 [ 172.344086][ C1] do_syscall_64+0xf7/0x1c0 [ 172.348578][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.354716][ C1] RIP: 0033:0x45a3a7 [ 172.362422][ C1] Code: 0f 1f 00 b8 5c 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 6d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.382188][ C1] RSP: 002b:00007ffcb6f20038 EFLAGS: 00000202 ORIG_RAX: 0000000000000058 [ 172.390586][ C1] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a3a7 [ 172.398567][ C1] RDX: 00007ffcb6f200d7 RSI: 00000000004c00d3 RDI: 00007ffcb6f200c0 [ 172.406544][ C1] RBP: 0000000000000000 R08: 0000000000000220 R09: 0000000000000017 [ 172.414502][ C1] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000001 [ 172.422462][ C1] R13: 00007ffcb6f20070 R14: 0000000000000000 R15: 00007ffcb6f20080